{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "build-service",
                    "konflux.konflux-ci.dev/owner": "konflux-build-service"
                },
                "name": "build-pipeline-config-read-only-binding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxBuildService",
                        "name": "konflux-build-service",
                        "uid": "a0dbd269-10a7-4107-a0f6-db3e965174d8"
                    }
                ],
                "resourceVersion": "25043",
                "uid": "fe3e325b-2390-48c2-af65-335939c9bad2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-build-pipeline-config-read-only"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service",
                    "konflux.konflux-ci.dev/component": "build-service",
                    "konflux.konflux-ci.dev/owner": "konflux-build-service"
                },
                "name": "build-service-leader-election-rolebinding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxBuildService",
                        "name": "konflux-build-service",
                        "uid": "a0dbd269-10a7-4107-a0f6-db3e965174d8"
                    }
                ],
                "resourceVersion": "25108",
                "uid": "082ebafb-d1cb-4eb0-9c84-107f96c1f7a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:58Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-service",
                "resourceVersion": "24403",
                "uid": "946b98f5-322e-4df6-9426-eae2ef8a679a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-service",
                "resourceVersion": "24993",
                "uid": "4b004528-6de6-4d50-949e-e9512721855b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "build-service",
                "resourceVersion": "25227",
                "uid": "b9f9e4ec-4f46-438f-830e-99dc09038311"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-1",
                "namespace": "build-service",
                "resourceVersion": "25170",
                "uid": "faed6bfb-fcc4-40fe-8578-19b85b2f5a48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-service",
                "resourceVersion": "24485",
                "uid": "ca037620-0e6d-4fee-9d28-bb7aa4a86f1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "openshift-pipelines-edit",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25052",
                "uid": "54c51b58-e093-4e98-8e4c-082ec960d17d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25023",
                "uid": "3d6d6187-bfc4-4dd1-9654-3b4b67cc3869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:deployers",
                "namespace": "build-service",
                "resourceVersion": "24800",
                "uid": "27062554-cd7d-4cad-bca1-fbcc05380be0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-builders",
                "namespace": "build-service",
                "resourceVersion": "24815",
                "uid": "b6d6755a-6bdd-4e74-8686-deaf40f5eee8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-pullers",
                "namespace": "build-service",
                "resourceVersion": "24486",
                "uid": "cff8d788-c364-4727-a3f5-6ef4d92051df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14962",
                "uid": "1604772f-fd04-4ec4-8b63-3f369ca33e8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:09Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "cert-manager-operator.v1.19.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "cert-manager-operator",
                    "olm.permissions.hash": "5BvcE6aNRl1kjQ4qoZiC75uAhCACnLI6hzXqiT",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1-8avl0jYCNWpNVU2Mr9j8EIfRaMGFwRbvqpaG77",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "cert-manager-operator.v1.19.0",
                        "uid": "790786ca-ce15-49d7-af3d-562a7b02ff45"
                    }
                ],
                "resourceVersion": "16396",
                "uid": "1cb1b747-cec8-40df-a073-384a70c0c122"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1-8avl0jYCNWpNVU2Mr9j8EIfRaMGFwRbvqpaG77"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:03Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "cert-manager-operator.v1.19.0",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "cert-manager-operator.v1.19.0",
                        "uid": "043354ba-1400-4254-b2a8-b7e11692f24b"
                    }
                ],
                "resourceVersion": "15769",
                "uid": "8269e6ad-e4b6-4dfe-a956-cd68188678db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1.19.0"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15375",
                "uid": "f621ff1a-d5fb-40b5-b0bc-ebd9439d7b45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15298",
                "uid": "0cf82e99-c208-41c2-b5a1-56e2b3b6c0ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15369",
                "uid": "6fddcd9a-e121-4e94-9cda-459236dbf25f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15324",
                "uid": "e67c60b8-cc1f-41c2-9413-a03ba67a7139"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15326",
                "uid": "feadd59a-2067-40ba-936e-8d7eebc19b4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "openshift-pipelines-edit",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19025",
                "uid": "c516e0ca-e62e-47bb-9a2f-4ec06d79377d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19016",
                "uid": "d7c81171-1f75-402a-a77a-52bc90d202a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15102",
                "uid": "61cf0215-381c-40d5-8397-1ba0ff24b343"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15117",
                "uid": "e72cc873-f5ec-46d1-a70f-b68237742fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "15111",
                "uid": "f5547790-8889-4000-856b-a2affdda735d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:35Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-tokenrequest",
                "namespace": "cert-manager",
                "resourceVersion": "18651",
                "uid": "a3fcf3e9-963a-41af-bf5b-8bd41b374367"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-tokenrequest"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:18Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-webhook:dynamic-serving",
                "namespace": "cert-manager",
                "resourceVersion": "17182",
                "uid": "7532db5b-7d79-450c-87d8-7a2e905786f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-webhook:dynamic-serving"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager",
                "resourceVersion": "16447",
                "uid": "d2085c6f-d59f-4629-ae1c-efcd0453d59f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager",
                "resourceVersion": "16368",
                "uid": "b949653b-52f8-41ae-9949-dc2c95b8c781"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager",
                "resourceVersion": "16398",
                "uid": "c374f073-122b-49ac-9ae4-46ed84074abe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager",
                "resourceVersion": "16416",
                "uid": "92f8a5d8-bca3-47ff-8c3d-89c96b2c387f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager",
                "resourceVersion": "16530",
                "uid": "56b7f30c-5846-49e0-87af-829711ccb66e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "openshift-pipelines-edit",
                "namespace": "cert-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "18998",
                "uid": "f3454eb0-f34b-4fda-a6a6-f5bce2cddf49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "cert-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "18976",
                "uid": "dbeccc7e-c5aa-4056-958b-aa5ac617afb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "system:deployers",
                "namespace": "cert-manager",
                "resourceVersion": "16418",
                "uid": "f660bffa-ca73-4de4-8715-2ca1647f1f79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "system:image-builders",
                "namespace": "cert-manager",
                "resourceVersion": "16448",
                "uid": "af08ad70-532d-408a-bad8-65927ae91945"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager",
                "resourceVersion": "16417",
                "uid": "0eb53e89-9705-4957-9cd3-fd7331b30e2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6205",
                "uid": "35f1795e-44e0-4a97-9a5d-5202e850f8a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6217",
                "uid": "4253311b-b8d3-40ee-b3df-5e18b2e63d0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6250",
                "uid": "a17f1623-452d-4780-80ca-cd7377c17613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6258",
                "uid": "8567aa5a-a051-4555-b004-6eb306c0af27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:21Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6782",
                "uid": "03658ccb-d541-40b6-9e50-4b1ec3378a66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:deployers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5626",
                "uid": "4d50cd5c-19da-43eb-a5f7-cb1e1b8631ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:image-builders",
                "namespace": "dedicated-admin",
                "resourceVersion": "5623",
                "uid": "f65a2498-e50b-4c42-a99d-85bcfcfbcfe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:image-pullers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5624",
                "uid": "85a12bfa-9573-4dfc-9b54-49add6ea1d0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "default-tenant",
                    "konflux.konflux-ci.dev/owner": "konflux-default-tenant"
                },
                "name": "authenticated-konflux-maintainer",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxDefaultTenant",
                        "name": "konflux-default-tenant",
                        "uid": "df538994-c1cb-4c5b-9248-17696273d032"
                    }
                ],
                "resourceVersion": "24710",
                "uid": "342a2621-2ac6-4c1c-b7c7-b5dab60ba1c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-maintainer-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "default-tenant",
                "resourceVersion": "25853",
                "uid": "5f1c160a-7b29-441f-ade7-3a4b7d557d5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "default-tenant",
                "resourceVersion": "24803",
                "uid": "059fb84c-c62e-4b6d-a25a-f4c2b6300368"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "default-tenant",
                "resourceVersion": "25248",
                "uid": "0e174316-29a1-42aa-8bc4-5e8d2116a743"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "default-tenant",
                "resourceVersion": "25226",
                "uid": "9f2ebf4c-4654-40d6-a623-ea336d28531f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "default-tenant",
                "resourceVersion": "24804",
                "uid": "213328c3-8ebf-4c95-babc-b13899bac45b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "default-tenant",
                    "konflux.konflux-ci.dev/owner": "konflux-default-tenant"
                },
                "name": "konflux-integration-runner",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxDefaultTenant",
                        "name": "konflux-default-tenant",
                        "uid": "df538994-c1cb-4c5b-9248-17696273d032"
                    }
                ],
                "resourceVersion": "24782",
                "uid": "e0d69bda-51e8-4ea0-a528-9675fc4fc417"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25148",
                "uid": "fe1af16e-0da2-442c-af3d-34c6b15c7eed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25129",
                "uid": "30c601ae-3ffd-4fb7-bba1-62f65bb97c32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:deployers",
                "namespace": "default-tenant",
                "resourceVersion": "24810",
                "uid": "f4a78bfd-ce96-477e-b941-e45afe8c36e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-builders",
                "namespace": "default-tenant",
                "resourceVersion": "24802",
                "uid": "bf27d345-14e8-4020-b7a2-854e8df17a31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-pullers",
                "namespace": "default-tenant",
                "resourceVersion": "24814",
                "uid": "1daed43e-23c2-4782-bfa7-6b2d4a49ee87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "default",
                "resourceVersion": "5831",
                "uid": "9113b067-36fb-44ed-a122-f6b1a78afa7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "default",
                "resourceVersion": "5147",
                "uid": "47860684-8d20-418f-bfb8-e92bb5f92eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "default",
                "resourceVersion": "5204",
                "uid": "74811810-883a-4416-89d1-0c7f770449ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "default",
                "resourceVersion": "6366",
                "uid": "0ec7221e-2bf8-45a8-a0ee-84c5cb036ef2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "default",
                "resourceVersion": "5968",
                "uid": "95f937d1-b9b4-409f-aa67-7a5f7a918134"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "default",
                "resourceVersion": "5867",
                "uid": "c70292e5-8383-4fc5-b0fc-730d0013dd63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "default",
                "resourceVersion": "5375",
                "uid": "2a6fe9d6-d600-465b-8cd3-b76f392b3aa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "default",
                "resourceVersion": "6312",
                "uid": "0ce28854-57eb-467f-86f1-61a430798475"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "default",
                "resourceVersion": "6013",
                "uid": "a76456e6-863a-41f0-a2c9-860cbfe27254"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "default",
                "resourceVersion": "6058",
                "uid": "146a5148-48ed-48fc-9770-038fa99ec8f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "default",
                "resourceVersion": "6453",
                "uid": "ed6e4c0b-f439-4a68-aaa9-a6cd0040b43f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "default",
                "resourceVersion": "6477",
                "uid": "f937e7de-1519-4b78-9aaa-e512fed30780"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "default",
                "resourceVersion": "5365",
                "uid": "948488d3-de8b-42fe-84b4-e3accd6828b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19041",
                "uid": "e9fe5d7b-e854-444a-8b77-d2d9d6163d46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:38Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19036",
                "uid": "441f7afb-b947-4568-8a78-0bed2892e309"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:04Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.5.0"
                },
                "name": "prometheus-k8s",
                "namespace": "default",
                "resourceVersion": "12371",
                "uid": "249a0d39-d35a-4d40-9e54-8a0ca361b71a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "default",
                "resourceVersion": "3095",
                "uid": "7edfafc5-a74d-4587-b983-110ec755263d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "default",
                "resourceVersion": "3093",
                "uid": "a330b953-8532-457b-96a1-7b53966a61df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "default",
                "resourceVersion": "3054",
                "uid": "5962960c-0cc4-41f3-a5b0-7e091eb0e7d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25816",
                "uid": "3980836f-e649-4f9c-b9ee-c80aa0ac5b56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:09Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25886",
                "uid": "10a7b77d-c058-4527-b835-2dc468fc681b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25265",
                "uid": "d3f6b4fb-0a0a-49c7-bd33-70c86567caec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25246",
                "uid": "517eba53-2b1b-4818-b746-a0277894a0f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25847",
                "uid": "588828a3-d0ff-4f75-836b-e853e121f345"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "openshift-pipelines-edit",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25209",
                "uid": "6c0e431c-2a81-48cc-8c24-a452d9d2542a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25191",
                "uid": "02224b82-57f8-418a-a5d8-fdfdf89c5a3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "enterprise-contract",
                    "konflux.konflux-ci.dev/owner": "konflux-enterprise-contract"
                },
                "name": "public-ec-cm",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxEnterpriseContract",
                        "name": "konflux-enterprise-contract",
                        "uid": "2c92ec79-93b0-44c3-8034-97fbb32caad3"
                    }
                ],
                "resourceVersion": "24757",
                "uid": "dd61a081-4756-40a3-886a-355cd2ac0885"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontract-configmap-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "enterprise-contract",
                    "konflux.konflux-ci.dev/owner": "konflux-enterprise-contract"
                },
                "name": "public-ecp",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxEnterpriseContract",
                        "name": "konflux-enterprise-contract",
                        "uid": "2c92ec79-93b0-44c3-8034-97fbb32caad3"
                    }
                ],
                "resourceVersion": "24843",
                "uid": "363b3914-5d06-431a-9dbc-1fac24dd93b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontractpolicy-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:deployers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25133",
                "uid": "23f8015c-321f-41f2-9117-25e44344b031"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-builders",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25123",
                "uid": "e23ffd9f-8818-4c3a-b527-2eca6513be85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-pullers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "25125",
                "uid": "35b9c0c9-5270-4075-9fa6-4e27e699b821"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "image-controller",
                "resourceVersion": "25827",
                "uid": "1fd2fb0d-fd02-48ea-8362-fb2d249c20b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "image-controller",
                "resourceVersion": "25053",
                "uid": "52797bf4-1b44-4825-98f2-e68ab2113e7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-0",
                "namespace": "image-controller",
                "resourceVersion": "25054",
                "uid": "f7be9ba7-c121-45d0-bd8d-a8e5ca07b3a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "image-controller",
                "resourceVersion": "25300",
                "uid": "2ec9acb8-841e-497a-a64d-add54c28fcd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "image-controller",
                "resourceVersion": "24876",
                "uid": "6e303681-4e3e-47e9-88cf-542aa4a1b79a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller",
                    "konflux.konflux-ci.dev/component": "image-controller",
                    "konflux.konflux-ci.dev/owner": "konflux-image-controller"
                },
                "name": "image-controller-leader-election-rolebinding",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxImageController",
                        "name": "konflux-image-controller",
                        "uid": "2d208dc8-96ba-4ce5-8f26-ed642f258c41"
                    }
                ],
                "resourceVersion": "24783",
                "uid": "eebbdde5-f717-404b-9014-c84572ffbc0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "openshift-pipelines-edit",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25247",
                "uid": "b5822635-c87e-4649-a09d-b5ffa4453445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25225",
                "uid": "2a6f1ca9-5697-4de3-a6ec-7354e792322f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:deployers",
                "namespace": "image-controller",
                "resourceVersion": "24812",
                "uid": "df2c3361-153e-436d-bc91-ba23f7e4e1af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-builders",
                "namespace": "image-controller",
                "resourceVersion": "24805",
                "uid": "3d2e73da-0272-40de-bbac-7400e03261c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-pullers",
                "namespace": "image-controller",
                "resourceVersion": "24807",
                "uid": "a7ccbf85-031a-4285-ba76-845d3894b94f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "integration-service",
                "resourceVersion": "25833",
                "uid": "c4e497a9-5009-4b73-9e28-341d516a473b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "integration-service",
                "resourceVersion": "25022",
                "uid": "1bae3dc8-4170-4003-a86d-503970cb72f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-0",
                "namespace": "integration-service",
                "resourceVersion": "25083",
                "uid": "56203921-5bab-479f-b389-63153da1931c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-1",
                "namespace": "integration-service",
                "resourceVersion": "25122",
                "uid": "aa725976-4951-4e24-adca-e055a8f15d98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:58Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "integration-service",
                "resourceVersion": "24444",
                "uid": "3346ce69-e580-47a7-ad41-da8c03cc4018"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "integration",
                    "konflux.konflux-ci.dev/owner": "konflux-integration-service"
                },
                "name": "integration-service-leader-election-rolebinding",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxIntegrationService",
                        "name": "konflux-integration-service",
                        "uid": "a94b6852-a71a-4314-b898-43ef8d289c62"
                    }
                ],
                "resourceVersion": "24897",
                "uid": "9083bf4b-308e-4f76-98f0-7f161cc10c07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "openshift-pipelines-edit",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25298",
                "uid": "b969a11d-d91f-40f7-aabb-0feba868909d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25281",
                "uid": "caf64443-730c-465a-b04b-a0db287b3e99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:deployers",
                "namespace": "integration-service",
                "resourceVersion": "24811",
                "uid": "8e3eb226-329b-4abc-b49c-5297e84ce85f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-builders",
                "namespace": "integration-service",
                "resourceVersion": "24813",
                "uid": "e2b636f6-6dcc-4c78-81a0-5bda68ecce90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "name": "system:image-pullers",
                "namespace": "integration-service",
                "resourceVersion": "24809",
                "uid": "5c7d465e-dbb3-4806-aada-be6ef21efac2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-cli",
                "resourceVersion": "25841",
                "uid": "bb90861d-bb79-4b0b-8ba9-ace8b7d43029"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:09Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-cli",
                "resourceVersion": "25874",
                "uid": "862e2e9b-fa1e-4a76-9c8f-39b7d9f7fedc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-cli",
                "resourceVersion": "25282",
                "uid": "9fbbdeb1-3ad4-4f4f-9e09-41a0132bd31e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-cli",
                "resourceVersion": "25264",
                "uid": "84517910-88fb-4353-b4d2-9cd0a4d5df56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-cli",
                "resourceVersion": "25810",
                "uid": "2fc86a2b-b4e9-4844-90be-2ed6fbe4f6e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "cli",
                    "konflux.konflux-ci.dev/owner": "konflux-cli"
                },
                "name": "konflux-cli-configmaps-read-binding",
                "namespace": "konflux-cli",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxCLI",
                        "name": "konflux-cli",
                        "uid": "edf867a7-1e39-4088-8440-79bdc4d66462"
                    }
                ],
                "resourceVersion": "24796",
                "uid": "9afecd82-79c5-4ba1-b919-b6b9c375b451"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-cli-configmaps-read"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:05Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-cli",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25690",
                "uid": "e119a269-1c38-47ba-8017-193d9802e54e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-cli"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:05Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-cli",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25682",
                "uid": "a123c737-067a-4941-9a85-d6b3f8a34022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-cli"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:deployers",
                "namespace": "konflux-cli",
                "resourceVersion": "25124",
                "uid": "8e18d672-5823-4c2a-a0b8-8bd4a500334d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-cli"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-builders",
                "namespace": "konflux-cli",
                "resourceVersion": "25126",
                "uid": "0e900524-c5c4-4102-b874-395f76137420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-cli"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-pullers",
                "namespace": "konflux-cli",
                "resourceVersion": "25128",
                "uid": "9e236509-6c78-45cb-a084-edd2d47bbbd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-cli"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-info",
                "resourceVersion": "25846",
                "uid": "314b297d-fa1f-4436-9174-ccde476159e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-info",
                "resourceVersion": "25858",
                "uid": "076a0409-77a0-4ac1-8dd3-c6eb02cdeedc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-info",
                "resourceVersion": "25171",
                "uid": "341156fd-5fd8-4bbe-86ae-da4cc95ca857"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-info",
                "resourceVersion": "25192",
                "uid": "01773205-5ed7-4751-a747-bf0bc9d16450"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-info",
                "resourceVersion": "25834",
                "uid": "38dcc9f3-bc03-4541-b6ac-d8c120e1fc91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "info",
                    "konflux.konflux-ci.dev/owner": "konflux-info"
                },
                "name": "konflux-public-info-view-rb",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxInfo",
                        "name": "konflux-info",
                        "uid": "8a358768-de5a-4390-9821-9be1d9140380"
                    }
                ],
                "resourceVersion": "25136",
                "uid": "e001d24d-7303-49e2-8eb3-1ca45bf68bc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-public-info-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25337",
                "uid": "0f447f3c-665d-4e68-ab68-9c128451f011"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25319",
                "uid": "0d7a9ec3-2056-4f39-997d-0593c231cccd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:deployers",
                "namespace": "konflux-info",
                "resourceVersion": "25080",
                "uid": "6764b5fe-a321-4ab8-b43d-eca7a97bd2c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-builders",
                "namespace": "konflux-info",
                "resourceVersion": "25081",
                "uid": "eaa78877-c192-46c3-b869-d3930c1e6c04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "name": "system:image-pullers",
                "namespace": "konflux-info",
                "resourceVersion": "24943",
                "uid": "22e0939f-6727-48ac-b647-858e26efbf27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "konflux-operator",
                "resourceVersion": "15027",
                "uid": "deb08257-bb6b-4473-b044-a8871758fc43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:51Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-operator",
                "resourceVersion": "15396",
                "uid": "0d390db2-5ad5-43be-aedb-0e198657b95e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-operator",
                "resourceVersion": "15290",
                "uid": "bfaafcac-f7b8-4fc4-9b85-e1bd741593fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-operator",
                "resourceVersion": "15359",
                "uid": "3f7b369b-010b-4dff-916b-42202e5fdc7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-operator",
                "resourceVersion": "15303",
                "uid": "a2de7554-f6ba-4b69-b0c4-33712d09963b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-operator",
                "resourceVersion": "15334",
                "uid": "adcbee24-b68b-4a74-8739-3505151688f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:11Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "konflux-operator.v0.1.12",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "konflux-operator.v0.1.12",
                        "uid": "c905e20d-2a95-4df0-8dcd-5f916146be63"
                    }
                ],
                "resourceVersion": "16342",
                "uid": "71023072-5d09-437d-9465-20c3bf4f1c06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-operator.v0.1.12"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:22Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "konflux-operator.v0.1.12",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "konflux-operator",
                    "olm.permissions.hash": "6VkYjWmwqEjnVGzheji50fOML3rUm81RARgZTo",
                    "operators.coreos.com/konflux-operator.konflux-operator": ""
                },
                "name": "konflux-operator.v0.1.12-3GYnKRs3WgQO6MPlyCz0Vpx2d70egSll3GdRUy",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "konflux-operator.v0.1.12",
                        "uid": "5a34ec93-6640-4230-9cbc-43114870c754"
                    }
                ],
                "resourceVersion": "17636",
                "uid": "83f971c5-39a6-469b-98bb-8ef86841ce73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-operator.v0.1.12-3GYnKRs3WgQO6MPlyCz0Vpx2d70egSll3GdRUy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19056",
                "uid": "105931f2-cacd-47bc-98c0-7d0eed483893"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19050",
                "uid": "20a7d02d-42b1-408a-9972-f50e39e8fc3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "konflux-operator",
                "resourceVersion": "15130",
                "uid": "a095977e-ca36-4cf8-9384-34db3082cb8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "konflux-operator",
                "resourceVersion": "15132",
                "uid": "e83e88ed-d576-412d-bbf9-d0a36381efe0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "konflux-operator",
                "resourceVersion": "15127",
                "uid": "98ccc904-8760-4ace-87b4-9d2f08318dfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "konflux-ui",
                "resourceVersion": "15028",
                "uid": "57befdb2-a386-4515-9e6f-a2389b03ad0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:51Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-ui",
                "resourceVersion": "15397",
                "uid": "f8f458f2-5853-499d-88ac-8caa22572bcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-ui",
                "resourceVersion": "15293",
                "uid": "12388a39-e2a9-4893-94ba-11786aaae7d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-ui",
                "resourceVersion": "15360",
                "uid": "010cdf7f-022d-4f8f-a5ea-6f5c93200aed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-ui",
                "resourceVersion": "15304",
                "uid": "465b7285-796d-447f-9cd6-7a11a452faca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-ui",
                "resourceVersion": "15358",
                "uid": "a41bb6dc-a074-4c66-98dd-e3fe8df50353"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-ui",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19072",
                "uid": "18dc2265-f261-437b-bc33-963023cb5c9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-ui",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19065",
                "uid": "c675d8a6-a7e5-41ba-8a4c-7ec25863cffe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "konflux-ui",
                "resourceVersion": "15133",
                "uid": "5fd5381d-e1f4-4fda-841b-ee37639814c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "konflux-ui",
                "resourceVersion": "15129",
                "uid": "422c8a7a-7a30-4f14-86da-6c5c875d6adb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "konflux-ui",
                "resourceVersion": "15131",
                "uid": "e5c1b4d9-37b1-4028-aee8-810a8ea8fcb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5794",
                "uid": "2e755472-78cf-422c-b6ae-ca68eda85933"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "4939",
                "uid": "96bb7df1-81eb-4e81-b404-75fb9bf9c967"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5092",
                "uid": "72bb5d0c-d8ff-425c-8c69-ddedc91f24c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6423",
                "uid": "aeb41c90-4c54-4cfc-87cb-e30dfa3cc386"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5982",
                "uid": "dfecb994-e76f-4863-b0a9-6a2b96d5c7d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5773",
                "uid": "b4fc966a-1c94-4a63-a6c3-2a9427885249"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5427",
                "uid": "b06585fc-a177-401a-b50c-ae281978e84e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6294",
                "uid": "556413d1-91f3-4841-b4e3-b37467b71bda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6025",
                "uid": "02c2e52d-6be7-488b-b04d-189cfb7d5929"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "6235",
                "uid": "b484f2be-485a-4f29-bcec-77174ca66d1a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6619",
                "uid": "8e026ec6-8a97-4842-b6ac-a32f0d22fee7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "6657",
                "uid": "9bb6f6e2-872f-4b3c-99d9-8215760398d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5338",
                "uid": "6b0251f4-236a-48dc-b113-38f92c622555"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "kube-node-lease",
                "resourceVersion": "3098",
                "uid": "80047040-722c-4959-8409-e051f04bca09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "kube-node-lease",
                "resourceVersion": "3094",
                "uid": "9aa0a38d-724d-4f6e-8db3-677cb909316e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "kube-node-lease",
                "resourceVersion": "3056",
                "uid": "5403d762-fef0-41c1-a043-33441e4d2d9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-public",
                "resourceVersion": "5777",
                "uid": "f5814473-ab42-49c6-b611-dbf5e2571d1a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "kube-public",
                "resourceVersion": "5010",
                "uid": "416f25cf-1837-4874-b5c9-034bfa798cfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "kube-public",
                "resourceVersion": "5211",
                "uid": "aae1f24a-9bc8-4525-84b5-ecf92973b606"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "kube-public",
                "resourceVersion": "6252",
                "uid": "1eb8aa27-8330-462c-af95-45306176b821"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-public",
                "resourceVersion": "5872",
                "uid": "9d2a1f4a-28e0-4aed-a4f1-b2253c1d557a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-public",
                "resourceVersion": "5893",
                "uid": "ac55e297-e642-4edd-9d10-62e060c7736c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-public",
                "resourceVersion": "5361",
                "uid": "360a0889-d5c5-4f35-9af6-fd29f8a1ec2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-public",
                "resourceVersion": "6422",
                "uid": "a0b8950f-018d-40c1-9f3b-932be019012f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "kube-public",
                "resourceVersion": "6123",
                "uid": "b4cb7134-d3e1-4315-9f66-dc47ae448d78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "kube-public",
                "resourceVersion": "6108",
                "uid": "efa2f359-356e-40cf-9d7e-9b88562efb0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-public",
                "resourceVersion": "6440",
                "uid": "c173672a-7c4a-49f2-b360-23276c7eac20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-public",
                "resourceVersion": "6572",
                "uid": "d926c98e-268f-4979-a82d-b56d6ecb5440"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "kube-public",
                "resourceVersion": "5238",
                "uid": "d45bbf41-0d34-4294-9cb0-fda36d899f3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "274",
                "uid": "ddda3181-7aba-460a-8065-21b804da16e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "kube-public",
                "resourceVersion": "3053",
                "uid": "cd544afe-c615-4b31-8c07-155b6e32d97f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "kube-public",
                "resourceVersion": "3090",
                "uid": "cae697a4-27e1-4c35-bcd0-a8f9845a6a9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "kube-public",
                "resourceVersion": "3091",
                "uid": "a5385a4f-4e0c-407c-a9bf-06dcba4e81de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:05Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "authentication-reader-for-authenticated-users",
                "namespace": "kube-system",
                "resourceVersion": "1626",
                "uid": "a474c39e-e2bb-4cf0-9da3-9ef7d0ae2793"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-system",
                "resourceVersion": "5721",
                "uid": "e05c9da9-09e9-4a7c-b29b-f4401d2a745e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "kube-system",
                "resourceVersion": "5138",
                "uid": "079fe9ad-6626-49d3-af00-f7961b75ab2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "kube-system",
                "resourceVersion": "5229",
                "uid": "9d7f15d9-25ac-481f-902f-83655fa29cbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "kube-system",
                "resourceVersion": "6411",
                "uid": "7ea20793-77ee-428f-9217-7cbf44df9e21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-system",
                "resourceVersion": "5901",
                "uid": "6fffdca3-e19d-47d3-91f7-336727949abf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-system",
                "resourceVersion": "5795",
                "uid": "7989339d-745d-4f51-ac29-0c37079e4c22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-system",
                "resourceVersion": "5495",
                "uid": "d28cf49a-16e9-4b04-8815-071433f8eb73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-system",
                "resourceVersion": "6286",
                "uid": "7cba2aad-1d75-44d2-a618-dfb80c8464c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "kube-system",
                "resourceVersion": "5992",
                "uid": "961256db-72a0-4a67-be8a-c17f0780bab3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "kube-system",
                "resourceVersion": "6243",
                "uid": "c44e258b-17cf-4aae-9e8b-04ecbc4220cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-system",
                "resourceVersion": "6603",
                "uid": "4aa9dfcb-5bbe-4b12-8e28-d2b98df47379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-system",
                "resourceVersion": "6491",
                "uid": "261d4c4a-ab82-480f-ab4d-5f55ee9057f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "kube-system",
                "resourceVersion": "5251",
                "uid": "a62040fb-9247-4d22-9b34-c0fea9cfee54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:19Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-cainjector:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "17353",
                "uid": "1ceab0c7-46b6-47be-bf3d-b812ab205440"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-cainjector:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:34Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "18628",
                "uid": "626d6427-a4f5-4223-b2cc-e3098bdb25da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:13Z",
                "name": "console",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2166",
                "uid": "b5f45523-10c9-4e8a-a6c4-dffd35443165"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:13Z",
                "name": "console-operator",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2161",
                "uid": "fb91f9d7-a726-4491-a737-c33b06c027ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:00Z",
                "name": "csi-snapshot-controller-operator-authentication-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1278",
                "uid": "ee65e003-5d40-4899-bda3-5462fdff9635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:51Z",
                "name": "insights-operator-auth",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "873",
                "uid": "b1ff0477-a6c9-4a02-8fa7-ae8993f050ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:02Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server-auth-reader",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "12040",
                "uid": "2d7768fb-cef6-400f-a401-4d8f22d34f52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:49Z",
                "name": "network-diagnostics",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4358",
                "uid": "1656cc2e-b6cf-4878-b12a-5e657ed3f4f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:04Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.5.0"
                },
                "name": "prometheus-k8s",
                "namespace": "kube-system",
                "resourceVersion": "12393",
                "uid": "76c0b1b7-c891-4677-8021-e41d6e5998c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "268",
                "uid": "cbd2cad9-237a-4611-93ba-021227de9d1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "269",
                "uid": "dabf864a-6c5b-439e-aa83-c103e1833ea8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "270",
                "uid": "594f90ed-9e2d-4b2a-8ea2-1427ada61671"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "271",
                "uid": "af500e2e-58bf-40a3-bf8d-60aca72ef708"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "272",
                "uid": "f4e3117d-3a94-44c0-bfb3-e2f248ec14c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:39Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "273",
                "uid": "ec66c9b9-9571-48c4-9603-aafd674465bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "kube-system",
                "resourceVersion": "3092",
                "uid": "58b9a932-4a90-4d0a-90e8-02c2282d0eb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "kube-system",
                "resourceVersion": "3088",
                "uid": "52e0be4c-7b93-4aa4-9b43-ad107bb94fec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "kube-system",
                "resourceVersion": "3089",
                "uid": "886c7e81-2d46-497e-acc8-b7d2539b5981"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:06Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:leader-election-lock-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "1632",
                "uid": "b4b8e027-ea53-46f7-a7af-94416945a5b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:leader-election-lock-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"authenticated-konflux-viewer\",\"namespace\":\"managed-tenant-8ywrt\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"konflux-viewer-user-actions\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "authenticated-konflux-viewer",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27466",
                "uid": "13266126-76bd-4a8e-8065-b1ee8fc877d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-viewer-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27440",
                "uid": "381d82a1-cb13-4cf0-a610-b93c02c1346b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27464",
                "uid": "d76ca45b-7e6e-43e1-a473-8c13731d0dfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:59Z",
                "name": "dedicated-admins-0",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27517",
                "uid": "1ec658fd-4a21-4e35-a7b0-6dc7d4d1bf5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:58Z",
                "name": "dedicated-admins-1",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27495",
                "uid": "c485c76d-04a8-4133-a1f0-25bd62d29a50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27447",
                "uid": "176de1de-2831-4c5c-8563-440453faf20e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:58Z",
                "name": "openshift-pipelines-edit",
                "namespace": "managed-tenant-8ywrt",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "27496",
                "uid": "2576c289-298d-478d-9db9-89ddf605b9f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:16:58Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "managed-tenant-8ywrt",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "27486",
                "uid": "935b2707-5ef4-4487-adee-44d09c699767"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"release-pipeline-resource-role-binding\",\"namespace\":\"managed-tenant-8ywrt\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"release-pipeline-resource-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"release-pipeline\",\"namespace\":\"managed-tenant-8ywrt\"}]}\n"
                },
                "creationTimestamp": "2026-05-14T11:17:09Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27636",
                "uid": "11a4a214-db3a-4b5b-8dde-c1debbaf1d63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "system:deployers",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27453",
                "uid": "5f368d4c-b5e2-4b09-9820-b7d74cc6e762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "system:image-builders",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27448",
                "uid": "9b4a6e93-618e-462b-a892-9246f4cadb0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:16:57Z",
                "name": "system:image-pullers",
                "namespace": "managed-tenant-8ywrt",
                "resourceVersion": "27449",
                "uid": "7c5deb3a-41f8-4ae0-87ae-62c4ac5c89c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:managed-tenant-8ywrt"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "namespace-lister",
                "resourceVersion": "25809",
                "uid": "674d6266-e48e-41fa-8ce7-328458a287de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:09Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "namespace-lister",
                "resourceVersion": "25880",
                "uid": "547a91ed-b4a7-4987-b8f8-7709dedfe864"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "namespace-lister",
                "resourceVersion": "25194",
                "uid": "e9a7c507-7e79-4706-b911-7defc2e3b26a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "namespace-lister",
                "resourceVersion": "25280",
                "uid": "f6101e12-5e8c-4928-b01e-4a54159a7376"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "namespace-lister",
                "resourceVersion": "25828",
                "uid": "66f33a13-14f9-41ba-a6ef-6a6e37ceb33b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:03Z",
                "name": "openshift-pipelines-edit",
                "namespace": "namespace-lister",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25398",
                "uid": "5a863854-2f03-4c0d-a258-7fc4f38df0aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:03Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "namespace-lister",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25372",
                "uid": "1a0e58a2-a181-4289-b310-172921912275"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:deployers",
                "namespace": "namespace-lister",
                "resourceVersion": "25112",
                "uid": "a677fc96-0426-45bc-adbf-778fc15d911a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-builders",
                "namespace": "namespace-lister",
                "resourceVersion": "25082",
                "uid": "69b939e7-bf03-4893-863f-62cc596d331a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-pullers",
                "namespace": "namespace-lister",
                "resourceVersion": "25113",
                "uid": "ef9505b2-8be4-495e-bf31-acb4e8929f51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "6207",
                "uid": "8b6a2e92-99e2-4c94-8a6a-6fa3e56a1fd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "6219",
                "uid": "e58fdf3d-2e3d-400e-b5ec-e41e7975aa02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "6253",
                "uid": "01639a4b-248d-4404-a3ec-b6d619c152dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "6261",
                "uid": "4a185a62-f4e7-4f38-8f56-860299c5fcd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "5262",
                "uid": "921d943b-58ed-47d9-8566-71eb46952955"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19089",
                "uid": "05df4030-83e8-4501-88d1-31519a59c50d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19080",
                "uid": "f67195f3-2cf8-49ec-932f-f826dfa4ee11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "3097",
                "uid": "95526af1-ef4d-45b0-824d-9da08e2bae62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "3096",
                "uid": "c5012317-6a15-499c-8ff5-bd748357f1df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8",
                "resourceVersion": "3055",
                "uid": "fb450dae-9a40-4c50-bd55-93a287800f8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-2q9lktsujcp2rmo1rhe0a18bkt0i1da8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6211",
                "uid": "6568a5df-a9cf-40ed-9193-1665039c6e0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6222",
                "uid": "15928231-90c3-4969-8ef3-e4dbe875799d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6255",
                "uid": "065e264c-14ee-4b80-9a4e-565119898143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6262",
                "uid": "ea8e85ae-05ac-4a09-a8d7-6f7c7f47b31f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5263",
                "uid": "9069968f-3be3-4e5e-bcc7-17df08864cf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3210",
                "uid": "7dcda17a-b1c8-4ab6-a00d-6d65c9ed49bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3239",
                "uid": "cbae41fb-36ec-4bbe-aa1c-e34d954078ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3181",
                "uid": "5226057a-e3e2-42e6-92d7-267fac87201a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5731",
                "uid": "e44fddb8-4feb-41a6-8913-a9ec1e738c14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4865",
                "uid": "40d824de-e9f5-47f4-abda-cd85901d9045"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5169",
                "uid": "3160b6f2-e4d0-4bee-af22-e1dd5fcb6dd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6315",
                "uid": "80d10c0d-59c8-4653-aaad-ba6e74e98be8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5962",
                "uid": "5029cce1-b8f1-48dd-80ab-8ee4acf99d99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5909",
                "uid": "d2ae831f-bbbf-42a4-bd8c-13d562455bf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5377",
                "uid": "ddd0bb13-b516-4596-939e-d5ea51047948"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6359",
                "uid": "71e4c652-c9cf-4af3-b522-9e70c6c3aa74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6102",
                "uid": "c8052363-fd15-4ad1-b09b-8c15481d0461"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6135",
                "uid": "b44ea06e-cdf3-4adc-9cc1-2aaca021ba43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6543",
                "uid": "ed26c1c9-b989-4eb9-be79-5489f03c119c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6562",
                "uid": "05be2078-cec5-44d6-b5a0-8bffc3ad294b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5253",
                "uid": "94919d3e-a02c-4cdd-8451-be830a7ee323"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:47Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "749",
                "uid": "d135e45c-e550-478f-a761-e3faf9520944"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3242",
                "uid": "18d42dcd-36c9-4702-b8a2-a8ff813f0af3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3243",
                "uid": "a82ea3d6-f205-4e74-a374-c49d6cb87d78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3247",
                "uid": "4b70b2ad-e470-49fa-9fd6-1cfa7b811381"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5859",
                "uid": "4e3c6818-6dfb-43d0-b169-d4a6b33e56ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "4944",
                "uid": "e79381ad-55cf-492e-8f46-de91824167bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5237",
                "uid": "e653adf4-9a58-4efe-8c9b-3701f33d356c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6340",
                "uid": "822ba07e-776c-44cf-88c8-3eec911d1cb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5874",
                "uid": "b27d56a5-b26c-4236-974c-5f1596c7316e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5825",
                "uid": "85b0aea8-5858-4b3a-9fc0-cecd864b15ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5441",
                "uid": "f27ade90-45fd-4606-a3d4-66ba294a0870"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6287",
                "uid": "9c065e01-a03a-4f79-a630-ba1538211317"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6028",
                "uid": "4ae4d315-6d9c-4551-9e2e-689753ee1c5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6238",
                "uid": "8cdad5b7-9b98-4c92-8ffe-721e24b0b07f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6588",
                "uid": "8e14153c-1425-4f69-9a86-4d3d78c9ad99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6649",
                "uid": "279ca7cf-7453-498f-a0fe-00ec0c89216b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5213",
                "uid": "c305229d-2212-4273-95b7-77a011c1a38b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1801",
                "uid": "f1cdffd1-c36b-406f-affb-0c1b20405f92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3209",
                "uid": "eb554ff0-9826-4120-99ec-5e3af7c33780"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3246",
                "uid": "de06dab0-360a-436d-9840-34e2c124dd19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3238",
                "uid": "aed7a376-e017-4b27-95f1-7560a4a9902f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5737",
                "uid": "554ae149-4b8c-413b-b8b3-3c441eb12cb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5114",
                "uid": "c4684e85-7ed2-4c24-b2ea-463fbcc39dda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5124",
                "uid": "2ca8cbe0-7060-4516-b805-80dd7dd32794"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6254",
                "uid": "fc7410c7-3c7b-4fb6-8587-e6f5af1fac6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6042",
                "uid": "be6fa9e6-4280-4105-878a-f67778becf6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5922",
                "uid": "586f885c-96af-480a-855b-f7ff7698d010"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5517",
                "uid": "5937ebf1-196c-42bd-adb6-6b474c663eed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6298",
                "uid": "bbd4d85c-f7aa-445e-aec7-ff193c873f32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5974",
                "uid": "bfb7bcfd-673d-4b7c-a2db-11f691a12855"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6137",
                "uid": "7c996123-5f2c-4b86-b8d3-8f25a7e956d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6566",
                "uid": "f82970b2-54b4-4213-99d8-3b3bd3abcead"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6550",
                "uid": "6e7ae36a-056d-4de2-b14f-9da326203a9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5173",
                "uid": "0d8ddf71-245c-47bb-8eee-6f7884b54169"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2745",
                "uid": "ee41e249-dec2-4039-8b95-4e642debabc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3260",
                "uid": "865f8590-f696-495a-991b-b0e00d320e91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3285",
                "uid": "b6fd07af-a859-43d1-8988-277ef435ec59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3244",
                "uid": "6d5b1f36-479a-4c45-99a2-0eb3efe33022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5834",
                "uid": "0e628a70-0633-4548-8c1a-b71aaa869fb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5102",
                "uid": "36f530e1-a91d-4fba-a5b7-1815ee3eaa2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5247",
                "uid": "cc1e3a8a-697b-4162-9286-af8a5c753b76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6266",
                "uid": "b965a2b0-abf8-4daf-ba78-1b63a077d2a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5984",
                "uid": "99782728-7046-48ca-9aff-c02d26f7089b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5937",
                "uid": "fd8a82c2-dc4f-44d1-b244-e82efb29cf00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5454",
                "uid": "36ab645f-6e5a-4fff-b80a-773d3d68d748"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6341",
                "uid": "7c9449a7-d378-448d-b219-01d3db485858"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6030",
                "uid": "e4247104-e52b-4fb4-99dd-8f884a2dbd86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6192",
                "uid": "d9b62b48-19f2-4b12-9260-c2e162788014"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6537",
                "uid": "5f6c4be5-181d-450e-a4e2-2434c05eacc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6574",
                "uid": "dea94be6-91ce-495f-b574-368eebe334a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5367",
                "uid": "fa8e475c-43df-42a4-a68f-c20421ff9417"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:26Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2787",
                "uid": "9188e0fb-198e-4648-9a0e-4090a43c2604"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3241",
                "uid": "0d6b19a7-5f5e-4c29-87d0-2ce5a0954a01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication",
                "resourceVersion": "3245",
                "uid": "ff6f2719-a7b6-4af1-9a56-9f62647ffe8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3237",
                "uid": "5bacae26-3110-4e4b-804c-c6a43e54feef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5740",
                "uid": "6e73665d-7c9f-4a46-b1ad-cc62aa638010"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6751",
                "uid": "274f3ab0-2475-4c97-bf55-b88d162eebd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6761",
                "uid": "b1641ed0-00ab-4f87-9e72-595a71bbebcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6396",
                "uid": "33dea757-f5f8-4c8a-a50a-b828d3cbee90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6014",
                "uid": "6682d68b-c1d9-4c08-bcad-251cef796aca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5817",
                "uid": "9fa100f5-8a87-4949-b5d3-6794019d3c6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5582",
                "uid": "62f5f5e1-9aeb-410d-9a59-8143c760017d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6343",
                "uid": "f75cbeae-835b-4007-98e0-5a972a67895a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6138",
                "uid": "eb75f800-46e0-4089-a2b5-168bdfa24896"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6073",
                "uid": "8583a071-d414-4482-a219-e6204991e0ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6605",
                "uid": "d8d8a24f-0e5f-4010-9399-7587f05ef1df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6661",
                "uid": "68489cc1-caeb-46a5-85c8-05862fbe35a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6835",
                "uid": "41defe22-1c67-45d6-9d44-812730d6e96c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5586",
                "uid": "20a9beaa-8c26-43b0-b18c-5c5e03333ed7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5289",
                "uid": "8db366ee-3c5f-4a04-b23b-56d84b04f196"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5286",
                "uid": "6aaabee1-f38e-4a42-835f-61d63181eb7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5290",
                "uid": "c62af51e-662f-4845-ab60-f1729f80656d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5742",
                "uid": "2079c735-3a66-44ce-aa6b-1043327125f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6778",
                "uid": "a73794be-c70f-43b6-a99c-ea53b90a0e77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6722",
                "uid": "92cb40cd-aaf3-472f-9b9b-f252a389ad04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6399",
                "uid": "68c53aa7-feed-4b2b-b581-e848629aa515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5928",
                "uid": "dc0f003f-f208-4c1a-8dd8-36650c679d28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5819",
                "uid": "8ff8760b-5704-4aa3-85c0-1a8c5d6dcd5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6834",
                "uid": "44842222-be2b-4203-b19f-bf4d59870ba9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6346",
                "uid": "9b6bff51-d3bf-4517-91fa-ba38506b657f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6015",
                "uid": "0a0dc40a-105a-4aab-bd6d-a9e7ed8b409f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6143",
                "uid": "d770d254-ee1c-4e36-beb4-8d3058b8d1a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6478",
                "uid": "e5ff32d3-152c-4baa-9057-7d3bf40b1e77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6577",
                "uid": "de5ba959-e104-4588-9752-955d4f18a6fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6856",
                "uid": "1378b76d-3e87-4a99-9cda-c44ac1995c38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5588",
                "uid": "40a7267e-2b9c-41fd-bf6e-b7d35d6fd60b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5521",
                "uid": "1cbc7dcb-f545-4193-a01a-549d7060fb71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5519",
                "uid": "23bc9dba-e902-425c-8014-bc4e8c86ce04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5518",
                "uid": "25fe3523-484f-4fab-9a55-833860154fb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5843",
                "uid": "a18bd629-a306-4ca9-ad9b-1be1a8d854f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6760",
                "uid": "32410c86-de23-4f10-ad07-1a3bdf3efdf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6785",
                "uid": "4cf7391f-d1cc-48bc-9a30-e021a3863487"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6288",
                "uid": "05ca2fd4-4df8-4dd7-9097-6301850facc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6029",
                "uid": "1a4ae5d7-b4df-4ad4-bce2-6256d93145b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5926",
                "uid": "52600ed1-dcc8-4938-9cfe-e0c2b97d10d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6830",
                "uid": "1fc3a088-8b5b-46da-9675-2dfde50abaf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6348",
                "uid": "f2f5c574-62f9-40d1-be76-dc50f000265c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6151",
                "uid": "4ae476fc-e3b8-404b-bca9-528cb9433776"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6186",
                "uid": "1164f47d-bba0-49b3-a2f9-741106c81433"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6545",
                "uid": "296ffe4b-6a91-4067-9bc9-84da5a984524"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6529",
                "uid": "b3f269af-12ab-44a8-b410-57c4ebee4525"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6828",
                "uid": "8484e315-5fa3-4659-8c4a-7fd7a8c964d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:28Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6866",
                "uid": "065a411e-0dd1-4ec6-940a-eb0c583afd9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5670",
                "uid": "ea9bda10-c928-4af0-b425-591423bf5d86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5665",
                "uid": "60634f5d-c7e3-4b3c-9427-fdf057d2177b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5666",
                "uid": "91ae98ec-cb84-400d-b7cf-9602276473d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5752",
                "uid": "2d1cc204-4bfb-4ddb-8f74-c28db6c450c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6753",
                "uid": "75d3cf3e-edbb-4169-b1e0-7cc604c846c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6777",
                "uid": "90183e02-c7cd-4ca5-bfc9-3c0e3d736bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6257",
                "uid": "7dd80b62-961d-4db5-9eeb-973d8566a7d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5903",
                "uid": "1b91fd40-6dda-46f2-89ed-0637e24baa2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5778",
                "uid": "4a8d73e3-f32e-4070-a26a-97e990b58b4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6861",
                "uid": "b7c0f530-e041-4612-9dfa-f8704db9bee3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6439",
                "uid": "d8787f6c-ad7b-4f61-b74d-cf7d72c7a1fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5971",
                "uid": "af917058-cf86-4a8a-b79c-d18508339e29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6206",
                "uid": "c3b1fbcd-abc9-49fc-8256-ad243de81e89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6516",
                "uid": "04653360-18b0-4ca4-9135-3ffa826dc603"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6663",
                "uid": "67501018-29b1-491c-9158-8e547bfc76b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6845",
                "uid": "baa125d2-7bb3-4bee-b726-b82ba9f305ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5590",
                "uid": "742984a3-2757-427e-b098-077494f162eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5564",
                "uid": "b1c27dc0-c9c4-447c-b0ea-c9ba7ab58960"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5562",
                "uid": "938ced91-5c88-4fed-b8a1-61a202732964"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5563",
                "uid": "c49b7cd2-fb49-4475-9449-351b7ca169b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5836",
                "uid": "997b7019-f20d-4422-a0f8-ccaa0b89406a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4899",
                "uid": "22fa62b9-5a1c-4d46-b844-bc98c5dec5d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5215",
                "uid": "e9e679ff-ea0c-4f7e-82d1-594aecaff3c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6274",
                "uid": "2c1b9cf6-f256-40e2-8f68-d5616c4332ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5999",
                "uid": "78647d29-90ef-4931-8d3b-4a9096ea3560"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5808",
                "uid": "96cd571d-d4b3-4d69-a902-88dd76d4d8a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5390",
                "uid": "28197884-6db6-4c78-a48c-bbc39aa6835e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6405",
                "uid": "b476ddc7-891f-47c3-9944-08d010e4239d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6035",
                "uid": "28fdfc7e-d4be-43ce-8f75-0e8b9ae9760a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6083",
                "uid": "923961e7-222d-48a5-bdd6-65e460f4bb8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6443",
                "uid": "7be638b8-92e9-4848-8b2f-20a478f618a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6502",
                "uid": "40aedc80-cea0-4d90-9c59-3968ae7b7906"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5330",
                "uid": "4d182a58-99ff-4a0d-8046-168b238ab1d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5592",
                "uid": "fb3e430e-7fbf-4757-9c5d-e13bbd643a7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4859",
                "uid": "5d0c5cce-141a-4974-81a5-7ff8a110b0c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4858",
                "uid": "1e0db598-e343-442a-92d9-106ec0593701"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4857",
                "uid": "c61f7b68-506c-4e6a-b10b-33fd9c706cb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5813",
                "uid": "8ffb6ae6-248a-4893-a298-0c969df95b22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6721",
                "uid": "bb49dc7b-3e8f-4ac0-8d2e-ea95f4e87da7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-cee-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5538",
                "uid": "1b54b8d2-a91a-44d0-8e8b-9370f61c3a13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6733",
                "uid": "0963c13b-a797-4f98-aa55-299b4524650a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6380",
                "uid": "2d055f63-2cf4-412e-bec2-8bb8671c36cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-csm-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5578",
                "uid": "2699b1f8-f847-4b8a-b4ee-cd053395fe45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5970",
                "uid": "2d4dfe10-4b39-4483-aefe-a9b6bf16d4a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5780",
                "uid": "7d8b479d-ff43-470f-ae91-f093ccd55566"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6854",
                "uid": "43b91b47-a440-461b-ae9b-5fd5ba8f1797"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-mcs-tier-two-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6719",
                "uid": "9afaaccd-3506-45b6-809a-29fa4edf31ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6407",
                "uid": "8dc012a3-f18e-40e7-8545-3a3fc57f4744"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-mobb-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5732",
                "uid": "c43b6867-852c-4c3b-88aa-ab0a5d2005f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6153",
                "uid": "a0e7dcee-5afc-4b4e-9c81-6eea8f96de2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6245",
                "uid": "c84dc153-c4ba-4318-8658-b79a56622ddb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:15Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6710",
                "uid": "7780d12e-0d17-43f4-97d6-6b0a731c6f69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6457",
                "uid": "caf7a680-744f-40a0-81af-8e8ae8f94976"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6553",
                "uid": "c6cbc23d-8853-44d7-9316-c1482e629d38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6788",
                "uid": "668b895b-6bd7-40f2-afb1-47c9ea778ffa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:34Z",
                "name": "backplane-tam-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6899",
                "uid": "55049151-9037-4a37-8c6a-85687376e6d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "osd-delete-backplane-script-resources",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5447",
                "uid": "f35af407-d060-49e8-83e1-001f9aa482a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5596",
                "uid": "984c901a-fb5e-4b9c-a3cc-2af411053bf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5438",
                "uid": "dc333e4c-33c5-4c5c-b780-96882cc2906d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5437",
                "uid": "d2ba8f41-35ec-4020-8526-c1bb7d4d3384"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5436",
                "uid": "b2c4a971-3a6a-40e4-a7f6-53bd23e5446c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5733",
                "uid": "d3a41a2b-51ff-4570-b496-8801f2b5f347"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4900",
                "uid": "838d1351-146c-4eba-913d-8b58853868e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5180",
                "uid": "afa75a34-8fcc-46fd-8e76-02faa7a3c4e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6292",
                "uid": "a04f885f-134f-424c-b3be-64810cb4ad8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5985",
                "uid": "1ff2461c-cb10-4776-801c-c8229f345fad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5797",
                "uid": "09b866e1-6e1c-4cb6-a3e4-cd56412fb97d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5583",
                "uid": "58267ba8-2e85-47e1-94a8-0df1668126d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6372",
                "uid": "168bc583-3d6c-4b54-a1a0-8fbf01baa8f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6066",
                "uid": "5eece476-ebb6-4daf-b9f5-954f5d58f70f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6111",
                "uid": "e410f108-063e-44b9-a4cb-9a013e64222b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6507",
                "uid": "60a34514-4287-468a-b048-374fd678974b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6653",
                "uid": "48856f6d-ac4c-4ce5-8738-4f0ab474b6e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5216",
                "uid": "33111127-c2bb-4077-b37e-f210b8b91f61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5597",
                "uid": "be0249a7-80b2-4118-a820-655817ca4f83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4805",
                "uid": "5081b2cb-7737-43c3-8a91-19acf1f71260"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4803",
                "uid": "f0f23438-80fb-4224-bd61-27443fc6771a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4804",
                "uid": "4706e692-f817-461f-bc51-267eacfb5ba3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6880",
                "uid": "ce7aa1a9-741c-4d04-9ccd-58352190662a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6708",
                "uid": "7c50e2d5-f0a3-4795-bba0-040868935e4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6780",
                "uid": "26dad67d-9f88-4976-bf6c-6c9a841f6711"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6342",
                "uid": "bb4cc4d3-7fd8-4afa-8c31-f5eac7bea05a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5955",
                "uid": "cad61091-477b-4976-97f8-963f331c8974"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5760",
                "uid": "1be1fe21-144f-40ad-ad50-56901d49d399"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6848",
                "uid": "15c256f4-5e44-4a91-ab99-9eb779ea4b1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6350",
                "uid": "d90475ac-8eba-42bb-81ca-1554d53e9f4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5976",
                "uid": "06fde297-d019-4a63-be3f-f3a4bb934fb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6118",
                "uid": "2c67247d-211e-4482-9ed3-af60af3394d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6522",
                "uid": "d841a9da-39e4-4996-ac2c-18c56d3600c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6479",
                "uid": "e3c36c42-9d45-4323-97dd-7e09cb887429"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6822",
                "uid": "8d36e561-b072-4237-8932-18d8c07aecf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:27Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6863",
                "uid": "96b26d4d-c28c-4c8a-9960-cb0fd65e3460"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5718",
                "uid": "a61175c1-cb4b-4a72-8008-298a6c3967b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5722",
                "uid": "3d1305ff-ba3f-4b35-901d-810d56a93c23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5719",
                "uid": "0b721454-43c1-49c1-8a0c-efd892dfb445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5754",
                "uid": "3bacee26-9c92-40b2-9a66-f18cf0d8c8f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6723",
                "uid": "26c58624-f1cb-4319-b5f5-87783e8e9a33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6756",
                "uid": "ec4ee462-6206-42ab-9cc1-7444947b9e40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6344",
                "uid": "6aa0e876-98e4-41ed-a987-b0a44b496bd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5972",
                "uid": "c9756282-0cf8-423e-8e28-57841ce7a53a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5956",
                "uid": "b0383440-ba8a-4a18-b2f7-1f9f8425045a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5337",
                "uid": "6e160149-7027-48bc-a397-c5be4cc0a0b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6446",
                "uid": "16d13569-41eb-429c-8ba7-5be4818f7143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6155",
                "uid": "03e3c18a-47bf-4ff7-9ac1-11fb42f0a033"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6218",
                "uid": "aabe87df-8fe5-424c-b868-5dd560df9538"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6523",
                "uid": "597a7d6d-8f7e-442b-968e-b729ff534481"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6672",
                "uid": "f479562e-64b6-4c6a-9a6a-111daad52306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6786",
                "uid": "5e07f1e4-50ce-4b14-a1fb-1373f2a4c054"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5599",
                "uid": "e015af43-4815-42fa-b04e-0c2cc1648176"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5326",
                "uid": "8ee9bf74-d473-4481-8d26-d6fd4850b6fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5328",
                "uid": "a87a7e6e-3cb3-4956-8cd6-4a3f411a0d2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5327",
                "uid": "9343d862-fc1c-45a4-adf8-1f34cf36faba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6881",
                "uid": "32fc9af0-e1c1-4c48-8c0c-115a02ed8120"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6763",
                "uid": "74efa31a-bafe-4d7b-bd96-b8490103fc8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6740",
                "uid": "a01b2f07-3967-4857-900a-228ee351dbae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6950",
                "uid": "4f740408-6740-4a07-8a6a-bac49c0286a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6907",
                "uid": "1640b6d8-e688-4d55-9749-a59c053ad41e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6875",
                "uid": "35126322-1201-40f7-8b3b-f584910249de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6841",
                "uid": "ead3e09e-ee8e-42b9-80e3-2e6ef0390c37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6951",
                "uid": "3d3f763e-0b86-4c96-b435-4fe351c59c82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:36Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6915",
                "uid": "dbe2c0b4-9bd9-4831-8724-2be74d92f918"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:41Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6936",
                "uid": "8bd46703-07fe-4c50-8eed-0dfe3d025907"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "7005",
                "uid": "a11c6faf-2023-40e1-9d00-6c38c984b251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "7188",
                "uid": "183de37f-4f80-49d8-8fbf-312f470ea47a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6836",
                "uid": "c4eaf440-8199-4b6f-9241-0ae4f07b5f65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:27Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6864",
                "uid": "2e87ca4a-63d3-4b4c-88e5-038e6b813565"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6696",
                "uid": "d1076dbd-4edf-42c7-8e88-766e6e5337d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6692",
                "uid": "85adab81-bc71-488a-953a-8f236ef4493d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6693",
                "uid": "3303cf56-03e7-4a9d-a8ec-a62906e3160f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5735",
                "uid": "6e799bf6-1405-4677-b078-2423e43b1894"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6741",
                "uid": "dc63b23a-96b4-4ffa-9af1-0a7862db1fe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5075",
                "uid": "eb4cc0cb-16b0-4f3b-b04f-0f1f49d40939"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6347",
                "uid": "37491f7a-cf0a-4a5c-90c4-206ffb27f21d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6016",
                "uid": "d0ea6b91-e71f-47a8-a9b9-bba4073308d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5871",
                "uid": "5afb1871-2561-43da-b173-a06f2ada014e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5380",
                "uid": "6b79820f-345a-4b0c-a6d0-eac090ca9593"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6408",
                "uid": "efcfc316-3fa0-4e82-845a-bd6be7240666"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6133",
                "uid": "1340158a-f24d-42fe-b6b3-77af36e58227"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6208",
                "uid": "a9b6c3fa-4cc5-4c8d-8fec-859a77aac3b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6526",
                "uid": "559ae5d0-502a-4dd0-ba28-68d303d15bbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6654",
                "uid": "160e18da-e538-42c0-abae-1c63b951fe96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5219",
                "uid": "b3d4b2e2-c0dd-493a-a4bb-28d7c0b1801d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5602",
                "uid": "3420f096-b8b7-45cf-809a-7d8b48948284"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "4893",
                "uid": "a79c7b05-c0e0-4d87-a379-07667b916ea4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "4892",
                "uid": "e26a11c3-84d6-4ea4-b0f5-16594948e2bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "4891",
                "uid": "a2f24a49-321c-4d8e-9ec2-37147aeca4d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5861",
                "uid": "b6fb6b81-26a5-42dc-b1b7-75f5706f3db0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6769",
                "uid": "ac908548-a5d6-4bdb-a930-4144806dbbfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6771",
                "uid": "c0a2b15f-88a3-46d8-8f08-f3bd1b4585c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6305",
                "uid": "087ad18f-da4f-48b6-a819-f54d227693b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6044",
                "uid": "f0f3d729-467a-4d90-8b4e-eeed99d4ed3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5767",
                "uid": "c0ef59b9-04f2-412a-90de-f10a30c8678e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6824",
                "uid": "265b614c-a5d9-4447-90a6-a0e541aa01dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6308",
                "uid": "6cfd5909-972a-4453-a5b7-8dcc8a6eb850"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6063",
                "uid": "dd69a344-463c-4558-ab8b-2848b64a2796"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6216",
                "uid": "b88725a3-cee4-4591-b6f2-01042a6cd0e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6476",
                "uid": "b366de2f-6a77-4f47-8d0b-4f7f572635c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6650",
                "uid": "5ce1e81b-5f1c-4bae-9a61-5fa448723de8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6831",
                "uid": "3399bbe9-3b98-4fa8-a28a-384f07716e96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5481",
                "uid": "e80f7a93-c8d3-4493-9ce9-b501325f5e0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane",
                "resourceVersion": "5488",
                "uid": "04cdc5fe-091f-4863-a1e5-a5de48bb4db6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5487",
                "uid": "6f5be597-5ddc-4ac0-bd2f-9c0d468f9b1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5779",
                "uid": "38b765f0-5f5c-4d0b-be32-fa1a8fb0bd3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5046",
                "uid": "5c473f37-59f1-4c42-8915-8b283140c6d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5249",
                "uid": "cc8daf06-bb43-457c-bd53-574519ae6525"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6318",
                "uid": "c7b826c0-a109-4ba1-8823-9b012b99b420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5945",
                "uid": "37417d80-c3e6-4c16-af03-48fa1da19c81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5930",
                "uid": "45ae34be-d7fb-4769-95ff-1bc82c897dba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5364",
                "uid": "86ccbfca-5321-440f-ad2c-6df50100b937"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6365",
                "uid": "80074483-ed23-4d01-9c39-20bd54bcedce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5997",
                "uid": "5b7308fb-88e0-4242-ac1d-9856d63cc51b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6224",
                "uid": "82e7aa0e-0e62-4b31-b9cc-df9f71bb92fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6447",
                "uid": "64661b84-01a9-493f-a00c-b96c942275ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6604",
                "uid": "7a88ec6d-fec2-432f-9cbb-bce30370bfcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5371",
                "uid": "58cfb9a6-76cb-42d5-b28b-ba370c903022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3259",
                "uid": "867667c9-88c0-4998-9eca-50547af62d81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3282",
                "uid": "c9992050-3327-4d13-a2f5-dc3083712d13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3258",
                "uid": "95d1a921-e645-4cc4-8863-b484c67aaf23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5838",
                "uid": "5f940c50-2f00-445d-90b6-d560f7f0be21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5141",
                "uid": "013857df-1d4d-4982-8951-f256992de067"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5088",
                "uid": "5097bd03-2be4-4522-9d37-8ab28e52dc73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6277",
                "uid": "b4b0b2a7-b30b-413b-b70d-ec96569b55c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6031",
                "uid": "e8ec862c-0f1e-40e4-81ce-78cdb43143d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5910",
                "uid": "960bd6bc-0400-40ec-b1be-b940c0689172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5446",
                "uid": "c8bc899e-8742-419a-bd86-452bed168734"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6302",
                "uid": "e95935a8-cb54-4e84-a346-553013efef18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6005",
                "uid": "05929e42-1b1a-4511-b89f-146858f46cac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6226",
                "uid": "530773f2-8aa5-4691-a0f9-17df07a43514"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6615",
                "uid": "0725f38e-060b-4c31-b67d-c2350a74c630"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6532",
                "uid": "aadf6958-037c-4085-8b37-4ff36415cc29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5245",
                "uid": "91a27615-0d02-4b11-b6a1-dd5318669c52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:56Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1115",
                "uid": "474a781e-6c95-412b-bb0f-d80daaea3d03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "831",
                "uid": "a3f9cf3e-8685-4c7c-9ecc-1bac554f2c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3276",
                "uid": "78ebdc90-1c91-4ba1-8d08-cf29399de2cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3281",
                "uid": "58c258ef-e717-49bb-b146-d8b58a4c1768"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3286",
                "uid": "9aa1de0c-d7c8-455c-9570-a2a318d9a6f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5689",
                "uid": "3c997652-1973-40fa-8abd-a8012bcdb550"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5069",
                "uid": "e6307897-ee2d-422a-a40f-6c4d3b616741"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5242",
                "uid": "48960bcf-f35c-4bc0-a9c5-e749e605b7f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6278",
                "uid": "bbe35963-139c-4d23-8028-18b66bf4630e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5920",
                "uid": "4b34a2e9-34db-4bd7-9c69-9d0561ca35e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5782",
                "uid": "55f7ad07-2346-43fe-b2fc-8932bd9c03aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5456",
                "uid": "bd926596-9ba2-47e8-aa69-fc1caecaca09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6466",
                "uid": "5fe4cd3d-43e5-4c7e-b33a-260277e87bd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6082",
                "uid": "39248ce5-b12d-47b2-bc6c-5687769b42df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6075",
                "uid": "4796b095-2b0c-4a44-8ed6-7501da44abcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6590",
                "uid": "2358a5b4-1788-4dba-8193-dd1f3e7b8f70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6513",
                "uid": "fc87121f-1ba7-496c-9da7-bc1eabbbf7f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5398",
                "uid": "95ebaffa-2312-48d4-9ce1-58f7e85cb8d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "cloud-network-config-controller-rb",
                "namespace": "openshift-cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "2980",
                "uid": "aee2daa8-b590-4e4f-b448-b48c7d0c4e70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3274",
                "uid": "a6071732-0ff9-49ae-a997-496bd03acc7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3277",
                "uid": "c011d705-4eb5-49ea-ad37-c41862132d1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3275",
                "uid": "e787cd97-0c9c-4832-a4e1-e3a37e4b8d11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:11Z",
                "name": "aws-ebs-csi-driver-lease-leader-election",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2077",
                "uid": "aa7c3c67-6b37-49c9-abe6-75bc1e459f8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-lease-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:05Z",
                "name": "aws-ebs-csi-driver-operator-rolebinding",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1612",
                "uid": "be30311a-74aa-4909-a3e1-9163d3a9528d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5724",
                "uid": "1a9e2ef1-fcb5-4d43-b252-cea7502892c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5148",
                "uid": "189bf3bc-f016-4186-a697-f796a8239ca5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5145",
                "uid": "46f64338-9f69-4099-90f3-db10f6e719a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6263",
                "uid": "1fb35197-52e0-4ca4-9389-291a03ed0c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6018",
                "uid": "cf1152ec-236c-44c4-aedc-c43f9a080fac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5942",
                "uid": "f41a0b10-3009-430f-8661-829ad944faa6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5392",
                "uid": "86731185-2bb1-4cf0-b855-01955e9a22b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6425",
                "uid": "e578a170-b639-4ec3-875e-e856d92cc13b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6009",
                "uid": "da40ca7d-9a1e-4d23-ac17-b671492ae39d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6086",
                "uid": "9c52e58e-767e-4aa3-b77e-658ea8bf5ceb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6511",
                "uid": "5abe971a-c646-4834-a62e-6eb499a4b9a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6581",
                "uid": "211688a8-db2f-4ed3-ad76-24bf6548fcb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5258",
                "uid": "f2b40d08-524d-4f8d-862c-40599b27e622"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3283",
                "uid": "ff06ed2a-ee59-4cc9-a62f-92592044a990"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3284",
                "uid": "f6d0bd1e-d74c-400c-8c35-d1689fe1b539"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3279",
                "uid": "29279ca7-4919-4862-a70e-69efe4a30311"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5853",
                "uid": "30d8eef7-1d43-448f-95e1-1f6ad21f5e1a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5073",
                "uid": "e58c4f20-f0ad-49ca-b083-bfd0a6592293"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5055",
                "uid": "548f8f07-48f8-46b6-ac9a-98eebf4d45dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6280",
                "uid": "02b407ae-de6d-4d2d-96f5-d4089cbbc31c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5875",
                "uid": "6336521d-5956-4a7e-a17f-990bbdda4488"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5912",
                "uid": "acbe7ae1-57a8-4837-bc26-aec5a8428914"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5497",
                "uid": "c7882394-7a1c-4cbc-b601-ad06a4407336"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6290",
                "uid": "e1add28a-50db-49b8-b570-ef1e4122820f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6085",
                "uid": "ac68fb70-412e-41b9-a70f-d78a6d4c513c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6185",
                "uid": "a025e859-e659-4a2e-b033-09804fc9903d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6528",
                "uid": "a42b239a-4e2a-4a01-9315-ade2f5386421"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6665",
                "uid": "cdb63731-200d-4c4b-812f-ba624953316e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5261",
                "uid": "93cdfe71-94f6-4c7d-b977-90aeced5f05e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:51Z",
                "name": "machine-approver",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "877",
                "uid": "818c9b55-767b-4b01-82d7-ef2bf5c8ac6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:48Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "762",
                "uid": "1db727fd-8b53-4b13-9b4b-77c2a7398970"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3278",
                "uid": "53273098-066a-438b-ad71-5848944e1e10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3301",
                "uid": "5fd4ac99-634a-4075-9e38-a0d5a1115ddf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3280",
                "uid": "d9b280a9-40cd-4107-a45b-4dc56af0931e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5844",
                "uid": "dacfe353-df7f-436b-96bd-57a2d6965059"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4973",
                "uid": "ec6a36c4-d262-4299-b7e6-8ffbadb876a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5244",
                "uid": "91276560-b6e7-4ade-ace5-3ba8de39ba9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6246",
                "uid": "ef1cfcad-d5df-4a1e-8711-384a33787c39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5963",
                "uid": "508a06d1-8631-49ed-b9c2-33b687345fda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5854",
                "uid": "fe2d1e63-607a-4c25-a3ff-54d159c47822"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5395",
                "uid": "f847b682-7158-4f94-b863-16448a969d83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6331",
                "uid": "491d5531-7fd6-42ef-aa01-433ae2f3bdac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6023",
                "uid": "0eb0a62a-bd61-4842-8605-8e2b924f80e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6144",
                "uid": "39b9bca9-273e-4ce4-886e-9b9a8932369f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6591",
                "uid": "bc3ebf80-7e0d-407d-94ac-e273bb910df6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6515",
                "uid": "3a22c6dd-7be3-42cb-bee7-dcf552078a6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5264",
                "uid": "7fc2c657-c5f6-4bad-971c-8f49e55e124e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:56Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1095",
                "uid": "228f38bc-90b8-4761-9ce4-9e69fb0cdf26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3272",
                "uid": "88d450ff-5856-4789-885f-5366d4ed4f87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3298",
                "uid": "b4a61ae9-44e1-40a1-852c-7eb0698420b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3273",
                "uid": "f6377a4e-56ea-4020-9cfc-d56351f0648c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5664",
                "uid": "643613f0-7636-48c3-9fc3-b19a4328314d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5019",
                "uid": "089a0423-5706-411c-935c-e0be4ec50f9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5128",
                "uid": "1c18d38b-2e92-4616-8a9b-f371791fe5e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6424",
                "uid": "55468b39-a198-4fd9-9856-bf5b4bb48d19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5929",
                "uid": "d238c3aa-03d7-480a-b688-b9c3b955f7c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5915",
                "uid": "2f00832e-bf23-4e27-89b2-166d415c72f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5457",
                "uid": "c90f5845-b826-48b7-bb61-2db67fe7c86a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6293",
                "uid": "8f300a31-7675-4b4c-9b48-8d957c0df995"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6060",
                "uid": "6c8e567c-830a-4f75-ab83-438c686d0b47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6214",
                "uid": "30b27394-4ce0-4d8f-b85f-5f2c12b7a283"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6546",
                "uid": "dac4f43b-9f3e-41c9-a0c3-8bb75bcc2b19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6510",
                "uid": "7c351abd-1d1a-432e-89f3-32c732136af2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5255",
                "uid": "2f59c267-528e-4509-bcf6-35d9423455f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:08Z",
                "name": "cluster-samples-operator",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1824",
                "uid": "f48e1add-ff93-4268-ae74-6300622dd9fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T11:07:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "13464",
                "uid": "6a9846bd-eac4-468e-b575-3701990b8e01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3299",
                "uid": "ee889bee-42a9-4b13-95a0-9249e7ffe478"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3302",
                "uid": "6ed419fc-dc6c-45dc-96ee-ec86eb6a49bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3300",
                "uid": "aa2dba27-eea3-4f76-84c6-50ceefb250cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:25Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5672",
                "uid": "2a195386-fa94-484e-953a-7aa55d00c7f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4902",
                "uid": "9bfd92ae-712c-446a-83d0-5caa9ec9d036"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5184",
                "uid": "507db369-dcba-4d69-9493-f2ba993e9ae3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6248",
                "uid": "b2673106-8cf9-465a-a6ba-28be2eed3973"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5868",
                "uid": "0f5cbe80-cf19-44ba-a69f-2df7e9f56671"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5741",
                "uid": "033198bb-3b4b-4fe0-9e5f-3da40e17194f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5486",
                "uid": "36c7ea8c-462d-4b26-a104-02f89e17ebbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6316",
                "uid": "037f99f0-2414-4bfc-80c8-db80666bdb59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6087",
                "uid": "374d37ea-1cd2-43bb-a8c4-f3f5e6e9e59b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6146",
                "uid": "726e98b2-7bbf-4a77-8229-5f4f3d7fee60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6617",
                "uid": "44de9297-70c4-4b1c-b23d-a4e888595be9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6667",
                "uid": "a4eb1593-0ce1-45f0-8bf3-691636266be5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5408",
                "uid": "3ac2296a-c8f8-4d56-992c-9d61d40a0cdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:59Z",
                "name": "csi-snapshot-controller-leaderelection",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1237",
                "uid": "7361b501-cb4a-4921-85e3-e9849b4e66ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:08Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-role",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1838",
                "uid": "0cbdf40e-40d9-4e6b-bf1f-f234f87f8492"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:48Z",
                "name": "prometheus",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "757",
                "uid": "96be9b22-3cf8-4f93-8a2d-763e5dcf8796"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3324",
                "uid": "539383fa-d461-4ea0-ae83-342621cca9ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3334",
                "uid": "bdd5a7e0-bbb4-4f2d-b091-57788189e451"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3323",
                "uid": "1c428ecf-0198-4e76-91c6-67f922fd6537"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5815",
                "uid": "5befc218-9416-4487-ba68-d5f2602575ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4866",
                "uid": "a91d9161-c380-4fa6-a785-2b2452705e06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5252",
                "uid": "5908de32-4a25-4603-ac1e-abf268f80a3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6297",
                "uid": "67c5ac87-145c-4b1c-ac85-fa73dd6de971"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5921",
                "uid": "cbdffd06-082d-4fb4-9647-419518cee529"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5918",
                "uid": "4cdfe9d2-abe5-4b76-afe9-683018927f02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5535",
                "uid": "28ef12f2-dafe-43ee-bcf5-592ae0a4d4b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6449",
                "uid": "9791c146-fbda-4836-9c24-1c7780ec2ca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6090",
                "uid": "ff021ffc-f6cb-4b93-beeb-19982896b5e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6247",
                "uid": "fcac0433-2302-44ec-939a-6d22c7fdc19a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6480",
                "uid": "c5f13426-edf2-449b-92c3-a69237c1edcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6606",
                "uid": "380b3d71-8345-45fc-92e5-4bc9c00a40e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5185",
                "uid": "72e172f3-6f1e-47e9-848c-4bebbecf2451"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "exclude.release.openshift.io/internal-openshift-hosted": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"exclude.release.openshift.io/internal-openshift-hosted\":\"true\",\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant Prometheus access to monitor the cluster-version operator's metrics.\"},\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-cluster-version\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"prometheus-k8s\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n",
                    "kubernetes.io/description": "Grant Prometheus access to monitor the cluster-version operator's metrics."
                },
                "creationTimestamp": "2026-05-14T10:57:39Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "532",
                "uid": "dbdd749f-6bb0-415a-929e-68daf2ab1834"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3346",
                "uid": "2546e101-3571-4c95-bc93-0c217d736e16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3360",
                "uid": "d4b73c71-0885-4c18-ad93-c6b2ba7b6891"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3345",
                "uid": "60629f90-5bfa-4b94-b912-fea4b9dd8801"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5676",
                "uid": "dfa2e384-78cc-4f89-b5a2-be24fa9d4b40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4923",
                "uid": "ca029a52-a7f7-4cb1-bc7b-18a16588ae9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5220",
                "uid": "6a8f72e3-30b0-4104-8819-56c83a1aa63a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6414",
                "uid": "4e5c9c46-c72c-4bf1-9000-5b2476ffeb44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5870",
                "uid": "d478a51c-bf25-472c-99e8-57ef7a234dc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5873",
                "uid": "e4b5cc1c-6755-4649-a205-f3c0712e94e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5529",
                "uid": "0acd7820-5db8-4df0-9878-2fc7f2289d60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6353",
                "uid": "6618d8a3-4d4c-4619-8ac3-5f45c81a3a4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6126",
                "uid": "c8c2ba84-9930-41c7-9a1e-3a668b2cab52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6120",
                "uid": "f6cc5c0d-ad0c-44ea-94c3-f90481bff485"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6539",
                "uid": "d80240f8-fc46-4ef3-80b0-27ae407a3e7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6565",
                "uid": "d646937d-a026-45e6-b396-ff9cacda2a0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5384",
                "uid": "7e089014-cc2f-4217-8f17-5198ea5014aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:52Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "895",
                "uid": "919f5952-1df4-46ee-affe-3437dde30016"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:13Z",
                "name": "console-configmap-reader",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2163",
                "uid": "5ea7ad36-5e86-43f4-80a4-e8f3404ef746"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-configmap-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:12Z",
                "name": "console-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2150",
                "uid": "d8cc1697-20b7-4211-bc73-f414a94ea69d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:12Z",
                "name": "console-public",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2151",
                "uid": "5150e988-16ca-4ebd-845f-43bfb7e7d6f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-public"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:10Z",
                "name": "insights-operator-etc-pki-entitlement",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2018",
                "uid": "a619ca0f-7476-49f8-8bac-05e2447b613e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-etc-pki-entitlement"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:54Z",
                "name": "machine-approver",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1032",
                "uid": "6847abe2-0279-475e-9de9-a8e0f38c111b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Grants access from any authenticated user to the openshift-network-features ConfigMap"
                },
                "creationTimestamp": "2026-05-14T10:58:50Z",
                "name": "openshift-network-public-role-binding",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4380",
                "uid": "b7f9a135-e44c-49db-a0df-5bf7fc2b588f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-network-public-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3414",
                "uid": "faec836a-a657-424c-a7b6-005d8a56ef8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3430",
                "uid": "2ad4bfa1-e71a-4349-b28a-2cff18f688ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3382",
                "uid": "3faa9392-bb8b-42ee-bcc9-ef4d9d02de5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:06Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:oauth-servercert-trust",
                "namespace": "openshift-config-managed",
                "resourceVersion": "1742",
                "uid": "26770915-6b26-4f46-8534-28976b9cc28d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:oauth-servercert-trust"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5820",
                "uid": "5968e6a8-1afa-4613-a13c-713a8f2815dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5045",
                "uid": "aff9e0a0-8efe-4601-a2b9-6ff127492e9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5149",
                "uid": "0e492e4a-3a44-403d-b7af-e99b9627f16e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6232",
                "uid": "0a016812-0300-4b5e-953c-1489482ced42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5965",
                "uid": "4940055d-9334-467b-95a1-b8d7bdcba420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5785",
                "uid": "bf53f67e-023c-4648-9618-94383f2bf0bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5461",
                "uid": "01c09621-0eb8-4b2e-889d-22d00a571bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6430",
                "uid": "51990720-4562-4d10-9279-3a789631168f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6104",
                "uid": "4427927b-3dc4-4887-b7b0-a1f5f49dbdb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6101",
                "uid": "06712de4-95b7-4530-8ac5-9cd0a5f434b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6568",
                "uid": "f5c1b9cf-e7c7-4975-b3c9-8e80e61c72fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6697",
                "uid": "4dfebf7e-faf3-498b-b0de-50d127e961d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5333",
                "uid": "2bff167e-d2ca-4ebc-8fa7-832a7caebc4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:10Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1998",
                "uid": "45d67247-bb4f-4e2b-998f-984d2635faf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3429",
                "uid": "71a6515c-a2ae-4cda-9f96-c2d8d6c1983c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3441",
                "uid": "ad3a9a10-92d6-4f9b-b967-7cb583925f22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3431",
                "uid": "d2df9893-e34e-4386-b2c4-1ccd25b18ac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config",
                "resourceVersion": "5781",
                "uid": "05ae1e26-2356-47b5-a544-076c8458c338"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config",
                "resourceVersion": "4945",
                "uid": "8bca1819-13d0-47da-beee-3852dc5a0a4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config",
                "resourceVersion": "5050",
                "uid": "f34b8f36-aec8-44cc-aaeb-6443a6aea912"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config",
                "resourceVersion": "6371",
                "uid": "a4ce5d59-cffc-4b51-bf49-b7f648b778c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config",
                "resourceVersion": "6020",
                "uid": "7535559b-e7a9-4278-8efd-ed7aea935e30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config",
                "resourceVersion": "5810",
                "uid": "34d77aeb-5638-4b7f-94c0-4227162db858"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config",
                "resourceVersion": "5403",
                "uid": "b1f62326-910d-47c4-875a-0eb4e10f05d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config",
                "resourceVersion": "6451",
                "uid": "d49708c7-e2f0-4555-b3cc-a476ec25c7ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config",
                "resourceVersion": "6094",
                "uid": "f3e4006a-fcb1-45aa-9a5b-3ea5c06bc57c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config",
                "resourceVersion": "6065",
                "uid": "ae608abb-3c08-492d-a6ff-eae0a4b71927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config",
                "resourceVersion": "6460",
                "uid": "dc776064-fa92-49e4-a84e-d89a65049abe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config",
                "resourceVersion": "6610",
                "uid": "7bbc56fe-4a6a-418a-ad7e-e9d8ef784716"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config",
                "resourceVersion": "5346",
                "uid": "967cbfd8-47df-4fa7-a9b8-adde73757750"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:54Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1047",
                "uid": "f4d30c26-f53c-4aaa-a74d-475c53271ebf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:10Z",
                "name": "cluster-samples-operator-openshift-config-secret-reader",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1978",
                "uid": "9d3c2e35-2383-4173-9ff9-ad269d46aa3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "coreos-pull-secret-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:13Z",
                "name": "console-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2154",
                "uid": "74cfe541-4ce9-477e-b2d9-266c1ff3444f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "dedicated-admins-project-request",
                "namespace": "openshift-config",
                "resourceVersion": "6705",
                "uid": "bec4e87f-b43b-42ee-8e4a-15e815ba33b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-project-request"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "dedicated-admins-registry-cas-project",
                "namespace": "openshift-config",
                "resourceVersion": "5167",
                "uid": "28514973-151d-4494-885a-edaab7b913be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-registry-cas-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:04Z",
                "name": "ingress-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1489",
                "uid": "760b818c-33a9-42aa-bc54-9bef8623b34e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:08Z",
                "name": "insights-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1844",
                "uid": "314aba79-5e64-440f-be60-2d84af3a61ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:deployers",
                "namespace": "openshift-config",
                "resourceVersion": "3372",
                "uid": "4a596fe8-c768-4fc8-b617-ce8188adcaac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-config",
                "resourceVersion": "3401",
                "uid": "6a66790a-8a92-4d25-87ad-f047994e3cfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config",
                "resourceVersion": "3402",
                "uid": "775a8a4f-9888-4b8f-ab8e-e07e45fb029f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5691",
                "uid": "fb484dca-d39c-402c-8994-53d02601ddf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5095",
                "uid": "8c1f62dd-35ca-432a-914b-bf8cb5b423e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5056",
                "uid": "c90f88f2-5552-4c8b-bb6a-f49be56f7803"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6309",
                "uid": "924177ce-f8da-4f54-b7fb-16666148f9c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5993",
                "uid": "853215fa-1bb7-4ef3-a7d8-456034bfadb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5745",
                "uid": "5333443f-31b0-4580-b281-d04dadce1b0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5366",
                "uid": "c9dd1dcc-14d7-4c8c-9dff-582f7706ddfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6332",
                "uid": "3902ac8d-9cda-47bd-80fc-920a54773279"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6076",
                "uid": "d0a6d7f6-391d-4dcf-afac-3265610d38fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6078",
                "uid": "81f03f8f-5b34-40b9-bd55-13eae7a33783"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6462",
                "uid": "d569a826-507e-4d8d-a859-06dd579cbe1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6656",
                "uid": "ad3d4969-93f5-41d7-92de-3327f9f2330e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5223",
                "uid": "232212d9-c191-4fee-8290-22f28cf468a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:12Z",
                "name": "console-operator",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2146",
                "uid": "24811f61-bee0-4943-9aad-bb4750556488"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:24Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2714",
                "uid": "89aa4b10-8b9b-4ffd-ba91-25ece5403466"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3485",
                "uid": "158517d6-cadd-437e-b4d5-6d6b9cfd0e2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3486",
                "uid": "22fbff50-7944-4d0d-87b1-8faf8a9c6cc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3484",
                "uid": "6cb37ba6-92d4-40c4-ac86-6e68e32bddb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5679",
                "uid": "64fc3e26-ad3e-44f2-a1f2-f68116d3e440"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5005",
                "uid": "17b5e224-eeb4-42dd-9545-633b76b783d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5112",
                "uid": "e38e83ea-2db1-4bb5-a264-a41042bffca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6299",
                "uid": "9df57c68-0306-42b6-b190-420ef8dd1ed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6008",
                "uid": "8a7ee6ad-6f68-4e88-b851-ebecdd35bcc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5858",
                "uid": "abea4b4c-7575-4178-b377-09d0164e070b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5585",
                "uid": "9c31e9ac-b94d-4082-b9d5-ae89809ef21d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6322",
                "uid": "5d081a62-c6f7-4fb3-ba11-ea8b14432b87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6000",
                "uid": "a0ebf66a-488c-46a8-97d9-4708a1a6df5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6080",
                "uid": "2dea58fe-bcfc-4b8b-ba6e-f1b8f123cc00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6499",
                "uid": "9e56cf5e-94b5-4116-85ef-72d5b0a8516d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6669",
                "uid": "19271154-1e52-4a4a-bffb-1204745b1e08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5353",
                "uid": "729cd5fb-84a3-48a8-bf26-0d9c44becfc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:11Z",
                "name": "console-user-settings-admin",
                "namespace": "openshift-console-user-settings",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2041",
                "uid": "d66a7668-c22c-4948-be20-ff8a2a967938"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-user-settings-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3497",
                "uid": "1515cb6b-8454-4ff2-ada3-d0ff59ace2c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3509",
                "uid": "21f527f2-aa3d-4f15-b246-76ebcdaed07c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3499",
                "uid": "a5927a1f-3cec-421d-b8d4-9d4873e6f0cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console",
                "resourceVersion": "5796",
                "uid": "b9a4547b-ebcc-4275-92e3-ac46b891c90b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console",
                "resourceVersion": "4885",
                "uid": "213d62ba-1f9b-40bb-adf5-76c2cb7ac9b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console",
                "resourceVersion": "5078",
                "uid": "7482aa0e-6ecd-4535-8512-dba9cb5dc786"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console",
                "resourceVersion": "6234",
                "uid": "80c98805-93c5-4212-bb25-c524529a6f6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console",
                "resourceVersion": "5908",
                "uid": "42e017a5-797b-47e0-a528-21763e0b7c49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console",
                "resourceVersion": "5769",
                "uid": "bec14e56-81b5-4c3c-a039-ed54b14074ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console",
                "resourceVersion": "5347",
                "uid": "08bec82f-04f3-47d7-add3-c704d70196ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console",
                "resourceVersion": "6304",
                "uid": "cf2c3345-3e32-4d31-a743-fcb32b10308f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console",
                "resourceVersion": "6069",
                "uid": "0959d5e6-ee39-4a63-9c08-2dc796ee8be9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console",
                "resourceVersion": "6199",
                "uid": "916987e3-e7b1-482f-a139-f181829b2b33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console",
                "resourceVersion": "6570",
                "uid": "148315c5-cec3-4fc0-8de7-647f7a43a634"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console",
                "resourceVersion": "6504",
                "uid": "b67ec64e-0ce7-4bbc-b339-1fe9fd6b8697"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console",
                "resourceVersion": "5350",
                "uid": "bdcbf84a-5bb9-4921-bcbc-8561395a94fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:12Z",
                "name": "console-operator",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2145",
                "uid": "efe43968-b96f-4470-98cc-9706142f2964"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:24Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2712",
                "uid": "c77c3d88-8626-4a65-8ea0-89c250687bd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console",
                "resourceVersion": "3461",
                "uid": "a181d362-c0e1-4783-9f6b-49df6a9adf65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console",
                "resourceVersion": "3472",
                "uid": "6ca98ab7-f6e0-40f0-99f4-940267f7d0af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console",
                "resourceVersion": "3462",
                "uid": "6e3f166c-89f4-46c9-913d-21b7fe38bb56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5784",
                "uid": "b165c1d7-085a-4a5c-b718-54a2bc58b042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5122",
                "uid": "1984a981-7eb9-48b4-9d4d-2c4a4e3c8696"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5155",
                "uid": "70bff349-59e1-42f1-986c-c889b65cc877"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6361",
                "uid": "3e120bfe-e63f-444c-ba96-544edd3aba16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6004",
                "uid": "2775d53b-65e9-475c-972b-65299c38c210"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5830",
                "uid": "58dab3e6-72e7-426e-8f3c-0822b8258288"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5383",
                "uid": "66b86ac2-de9f-461b-a31c-e4009c5f5fd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6441",
                "uid": "7f0b02c5-311a-49d5-b0a3-a6de543b164a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6017",
                "uid": "ece0327b-40fd-4678-80e9-587b94fa1023"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6229",
                "uid": "d3be4785-fb00-4892-8e52-8fbba896bf0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6580",
                "uid": "2d9393f5-e3e3-4ece-91ff-a3694f745111"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6508",
                "uid": "136af5e1-fbf0-48b1-ab4e-be11895f46c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5291",
                "uid": "ed6cae63-daa3-4965-8cb8-88070d2776b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:47Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "751",
                "uid": "aeb979f5-6606-4bb6-87cf-bbda898d021d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3548",
                "uid": "f0ec579d-f870-4d40-b51f-db5b5e9423a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3558",
                "uid": "c57b720c-ed87-4102-b880-698772591aca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3549",
                "uid": "609e48d1-8861-4840-9152-8091091a1f66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5826",
                "uid": "d28affb5-193e-450f-a1bc-ff2341321ea4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5100",
                "uid": "44780df3-6c06-47bf-9820-bbb636cd0ea3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5136",
                "uid": "e62a6674-ee04-4f5f-80ab-3683097eb78a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6373",
                "uid": "321a95c0-5c16-4378-9dc4-08c954745679"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6046",
                "uid": "4e0dfd68-3d09-494f-8956-ccabe4fee2fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5789",
                "uid": "5614ddea-dd6c-46bb-9106-7b088d95bb83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5594",
                "uid": "bc809e22-6bdd-4c5c-9363-632da06fcc70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6362",
                "uid": "ccf8e3d3-0e0a-4c76-b1f0-ccee72cf506c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6049",
                "uid": "a3c6e417-b150-4950-998f-b757649f899f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6239",
                "uid": "568c0d15-cdeb-4789-b747-fba6d92f0b4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6489",
                "uid": "f13b7791-66c1-4484-8ffe-1957a679f6a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6517",
                "uid": "d04034fc-6b02-4388-a52d-eddf525b0454"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5386",
                "uid": "3a94d830-0a63-4880-94db-464e508b0db1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3535",
                "uid": "70f221f7-9470-4c3a-9abf-0a5d54802c96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3536",
                "uid": "b7ad2bd4-0005-4be0-ae7e-10754eb4adbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3525",
                "uid": "c9f9979c-7388-4ae3-b8c2-73a61a06e922"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5846",
                "uid": "ddcda1fc-9189-4a02-9b74-8e848df2df8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6765",
                "uid": "b27219e3-c085-49d1-a22f-593e2082b2b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5187",
                "uid": "6d1b8053-e1d2-4218-9e1d-d14712a6f79a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6321",
                "uid": "1a58327b-0c05-4481-b9b3-320f98d7e591"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5987",
                "uid": "23d6f85b-a139-4f39-a132-76f7f4a010dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5860",
                "uid": "85b8ce94-407e-490b-a19b-efcdb1fe46bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5537",
                "uid": "6ce285a2-1de9-420e-ace3-bbfec21928e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6454",
                "uid": "50e138b4-9805-40dc-9e05-131efb68eab8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5978",
                "uid": "d1caefa6-10de-4573-abb8-e220bbbc63e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6149",
                "uid": "028c2a6e-7978-4245-994c-8a1dad02a93b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6485",
                "uid": "79fa2eb3-d785-42ed-b14d-dff46bdfd250"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6584",
                "uid": "46a410f2-3412-41b3-a7c2-9be6733b105e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5340",
                "uid": "3cdbc83e-655a-4504-802a-3d382369d2b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "dedicated-admins-customer-monitoring-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5540",
                "uid": "169446ce-9074-4ba8-8ceb-3143f1cf0534"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "dedicated-admins-customer-monitoring-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5581",
                "uid": "fef3014f-d73c-4198-b4d7-a0916da04f3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "dedicated-admins-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4943",
                "uid": "ee5279f6-1642-46a8-8a05-14a71aa3212e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "prometheus-k8s-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4940",
                "uid": "89e489ab-5682-42f4-9f07-f7f68a02932d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "system:deployers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4921",
                "uid": "044b16f9-3695-4a71-8341-1231b2f78619"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4930",
                "uid": "ffd71282-d2d1-492b-8ba4-9e0049007f20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4922",
                "uid": "6e862a3a-19de-456e-9525-1ef152905b1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:05:49Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                        "uid": "6cfd3a70-2ae7-4b20-9223-25769b0b79b1"
                    }
                ],
                "resourceVersion": "9417",
                "uid": "2da76c5e-a46c-44e1-91af-c14b8d44b3a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5694",
                "uid": "36689b70-fc96-4f3f-9896-e508bebcc722"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6712",
                "uid": "9e1788af-af33-4fe2-b657-175630438b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5081",
                "uid": "135ad33b-fee6-4956-a01e-8aa56e0e8821"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6325",
                "uid": "4f6f8e46-bc51-4f85-babf-b741b170da0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5931",
                "uid": "e1039254-596e-4edd-bb5a-c823449f93d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5793",
                "uid": "2a1d4839-18f2-4c6c-a124-9856aae59b13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5491",
                "uid": "c8afec22-ab0d-4cae-b054-377212ca7453"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6395",
                "uid": "4a2fd114-0e09-4f75-85a2-21957ae22066"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6145",
                "uid": "b1450747-71b2-43c8-8a9c-8c2aacc22a6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6122",
                "uid": "03b51923-b35c-4178-aeff-31c0277df947"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6551",
                "uid": "42ddb20f-3c11-45d8-987d-5f6dc05c3bbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6699",
                "uid": "d998e06b-2c50-4a77-9993-b006372828f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5176",
                "uid": "649e4939-7e61-4bad-b614-759b9ba93544"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:16Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "93kS0invRXyvjvhKUqw0RmNXHlq3DWDtSuHFzO",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "d39106dd-d65f-4382-817e-a2f75984c71b"
                    }
                ],
                "resourceVersion": "10277",
                "uid": "cc7363cd-4661-4f73-9b8a-d9d0bfc4e8bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "8cc62d61-8295-49f3-951e-b5047eb0c6cb"
                    }
                ],
                "resourceVersion": "9917",
                "uid": "bba96741-e570-481b-88c7-ed4fd0614972"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "system:deployers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "4972",
                "uid": "ff6a03ee-828f-4514-937f-0bdac61280d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "4970",
                "uid": "80b05f26-a827-419b-b980-38cd11a94390"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "4971",
                "uid": "4bf8f4ef-e87c-4ec5-a2ee-90a6da516be1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5762",
                "uid": "db6e1590-2233-49d2-acc6-558e54a4be8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5144",
                "uid": "9e318c14-17fe-429d-a4b1-754db7f0701e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5053",
                "uid": "f30212e5-0ff1-484c-8e94-7f116c5dd22f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6349",
                "uid": "30f564ac-ad9e-4cc9-aeb4-95857909a080"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5924",
                "uid": "d2b1233c-cfd1-49fc-b4c2-5dc665699287"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5946",
                "uid": "33c358bd-1c26-4d87-9c41-e4c515d2ca6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5352",
                "uid": "4802b0d1-4ab9-467e-b8f8-7bdc041eb0e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6470",
                "uid": "0b183500-cd4a-4c63-9d4c-33e571959b6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6157",
                "uid": "c118e102-a4f9-4ad2-9d56-b02a2b07a1bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6156",
                "uid": "2ba5cb2f-6bf5-43f9-a85d-5637bd1479d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6501",
                "uid": "906370e2-b07e-4937-881b-ae3d2166837b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6493",
                "uid": "59e9eec0-9f17-455b-b576-0fcfa06b634d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5376",
                "uid": "fd1b012e-acd0-4c74-9893-80c64a1f6292"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:54Z",
                "name": "dns-operator",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1026",
                "uid": "b2ec77ee-15f2-4f90-8df8-82cfa22b40ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:54Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1041",
                "uid": "5c580363-bdf7-4923-b5a9-b29f74d3f5c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:deployers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3597",
                "uid": "5da35bb9-f7a3-42e2-9dcd-1d90c3d15832"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3608",
                "uid": "259d632e-ba7e-4b82-a974-fda01f8b3a39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3598",
                "uid": "f1450791-52a5-4d80-ba37-a2a55ab246d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5744",
                "uid": "f3515b1f-1953-44f2-9879-e259a2c096ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5129",
                "uid": "4d516c2d-c7c7-4063-9287-6c09f573fac4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5105",
                "uid": "2e000a76-56ba-41a3-a9f9-19395dcfa10b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6268",
                "uid": "a25c3330-0ebf-4c17-98ba-aee771aa9c2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5932",
                "uid": "b1b72a0f-8f7f-4085-a3c3-ff8e7d292da5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5800",
                "uid": "1c596977-e2ab-4e7e-978c-a8c625b4b3e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5539",
                "uid": "84519f26-9ab3-4f8e-a143-e00d659c0516"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6379",
                "uid": "1183d8a4-7a55-4427-b020-9caf088482bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6107",
                "uid": "286d3bd3-4640-4437-aee6-a80e0c7064d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6189",
                "uid": "9e5e0fff-497f-445e-9577-fbdd3d64e750"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6531",
                "uid": "854cbf47-352e-4706-8862-856083835d7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6534",
                "uid": "84dd8381-d373-4592-a276-75e5b285f381"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5373",
                "uid": "cc4f7d6c-49a3-4c4d-8945-d261bb755de1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "dedicated-admins-openshift-dns",
                "namespace": "openshift-dns",
                "resourceVersion": "5693",
                "uid": "77002f0d-142a-45e7-baa7-23cb4d316577"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-dns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:08Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns",
                "resourceVersion": "1825",
                "uid": "53232721-4432-4e5a-b805-8f5d97486846"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:deployers",
                "namespace": "openshift-dns",
                "resourceVersion": "3571",
                "uid": "01539c2d-8026-40f0-9345-ea61ec34fed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns",
                "resourceVersion": "3586",
                "uid": "2574cab8-6fe2-4f6c-b244-91cf27b307b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns",
                "resourceVersion": "3570",
                "uid": "3742e7be-44d9-45d5-9ca1-f6b7c73e98b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5856",
                "uid": "d2c28330-af98-4e23-a911-bef84b186941"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4947",
                "uid": "2d9a2ac1-6407-4630-b59b-cd7f84c81d53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5158",
                "uid": "7f808c75-c418-4799-a9dc-ca3a80699d3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6351",
                "uid": "a763b0d0-7e21-43a7-afd2-7b2a7786253a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5936",
                "uid": "50875146-6a9b-4451-a040-08377b676957"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5772",
                "uid": "379f7a96-c1e1-442d-b211-04ee340c0bec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5522",
                "uid": "8eae75d2-049b-446a-9add-faa25a217daa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6381",
                "uid": "b379b3ed-58c9-4bc1-80f4-212fcfe7e829"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6052",
                "uid": "604ca79c-cf6b-4c32-ad8f-ed8d8ed19bc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "6212",
                "uid": "85d6e229-accb-470e-a850-1d37f54e1d2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6594",
                "uid": "b54464fa-458e-410d-88a1-f5c4ec008515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "6555",
                "uid": "5165fc4b-42a4-4910-82e5-51b4162029e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5389",
                "uid": "e026c8b5-d29d-44d2-9d38-3e302a128dc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:deployers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3619",
                "uid": "97e284fd-192b-4f30-a897-0e2d586dfead"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-etcd",
                "resourceVersion": "3631",
                "uid": "f114e736-c1a2-4584-9562-c14504cc58b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3620",
                "uid": "5fc1c644-ac14-432a-a60b-cb2e741d0311"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5747",
                "uid": "3fbad1a2-356e-4f97-8956-a1094e8980d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5087",
                "uid": "4eb2cee9-9a9c-4d77-810d-c7856f2dc7e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5059",
                "uid": "13a4185c-9e57-4dd5-9080-bdb5bbc3f638"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6327",
                "uid": "e5d6a5c6-c4cc-4ece-99db-f85a74974b00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6011",
                "uid": "47248488-c0fb-485f-afae-53820093a9d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5812",
                "uid": "d3963b5a-23c1-41f0-affe-7bb4b335e3cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5339",
                "uid": "a7c5f092-0cd7-447b-98f3-d547b8e2ff55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6474",
                "uid": "55fbf56c-b51a-44cc-ba32-542da21e167f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6109",
                "uid": "2296821b-bdad-4401-9757-1d092bb7f695"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "6152",
                "uid": "9446c3ac-6625-45ef-8e12-b24b2ecbfc00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6596",
                "uid": "0d5985f6-8dbd-45c0-9596-6e9a9756048e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "6587",
                "uid": "ee2cb585-2180-4ec1-acb8-d2a64e700788"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5224",
                "uid": "99d5f185-d1c8-4154-aec2-918a63825195"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:46Z",
                "name": "system:deployers",
                "namespace": "openshift-host-network",
                "resourceVersion": "4312",
                "uid": "552c0687-1077-4577-9afa-f49e22b6e536"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:46Z",
                "name": "system:image-builders",
                "namespace": "openshift-host-network",
                "resourceVersion": "4313",
                "uid": "c57d5f0f-56b5-404a-a6ec-71e8c0614057"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:46Z",
                "name": "system:image-pullers",
                "namespace": "openshift-host-network",
                "resourceVersion": "4311",
                "uid": "3fe4a683-658b-4a5c-b7ff-56c4439346a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5828",
                "uid": "bab734f7-dee9-4882-b854-cb6109c33f78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5131",
                "uid": "c31614f3-831f-4121-9b17-ee7116df259d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5118",
                "uid": "f4bc2ec3-12d0-4512-b8a5-3ad3b46667be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6401",
                "uid": "0c55d026-bafc-4740-a38f-7dea2bbef9d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5994",
                "uid": "b32dfe4f-4e22-4043-869b-aa15352310c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5802",
                "uid": "682530dc-13ea-493a-a4c1-dfd3d3bfc179"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5525",
                "uid": "1409d8c0-e12a-40ce-80b6-3dc73bf5fa2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6442",
                "uid": "8845e5b5-b2e9-4b1f-955f-b51ea2ee15f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6128",
                "uid": "2dfddedf-f7be-4989-b901-d95cd15ee3ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6125",
                "uid": "3b8b5054-4c30-4f4a-b4ee-73c36b653073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6469",
                "uid": "6e2e1bfe-8c35-424b-86b0-cc9dbdbe4ccc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6613",
                "uid": "e7528b0c-cdb8-49e0-8fe5-224f85b93cb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5190",
                "uid": "9f3b3955-85b8-4338-b9c3-d7136b1f0e26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:07Z",
                "name": "cluster-image-registry-operator",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1761",
                "uid": "bfc4153c-f229-49ad-a399-2369c89d6d6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:09Z",
                "name": "node-ca",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1944",
                "uid": "6579257b-14c3-46ea-8c5a-74d5a032ebd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "node-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-ca",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:51Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "876",
                "uid": "b7d0e948-abe7-4893-9c2a-ddbf78a386be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:deployers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3644",
                "uid": "a431b051-c714-4052-99c1-c30711eba450"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3653",
                "uid": "80cdd376-1b20-4f43-ac81-4bf6967953a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3643",
                "uid": "c395bfdd-9e37-43b6-b96d-bc2d828b2958"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5765",
                "uid": "12996271-9b53-496a-90e1-b69d489c2f59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4890",
                "uid": "513a92f1-c2f9-4d9a-9d73-7aad5f2f2e4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5061",
                "uid": "aebe8f22-cc14-4527-9439-71a61421a612"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6282",
                "uid": "b840633a-6336-4452-af09-4e9222148b83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5957",
                "uid": "bcab1d5c-13d2-47b1-89f3-13de386cc9b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5849",
                "uid": "1a122966-dbae-4302-87ca-9629c3d86c9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5405",
                "uid": "75ece84d-4baf-48ae-8633-c5e1c25ac2ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6456",
                "uid": "8803461b-bdb9-45c3-be76-79d9f6719997"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6072",
                "uid": "f84a590e-d693-4a35-bca5-c3c941a28162"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-infra",
                "resourceVersion": "6158",
                "uid": "c085b3f1-821b-4e08-84d7-f2451d2513df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6609",
                "uid": "af206ae9-3a60-4a0d-8f7e-8a596cae1ac7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-infra",
                "resourceVersion": "6618",
                "uid": "a5cb71a6-daaf-4cdd-93d3-83591ac9ddc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5360",
                "uid": "e91c5d8f-5a64-4661-b374-1f38f957c223"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:deployers",
                "namespace": "openshift-infra",
                "resourceVersion": "3664",
                "uid": "4cf58486-3d3b-47c6-878a-81a4fa953879"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-infra",
                "resourceVersion": "3675",
                "uid": "de40d048-0954-484a-8744-c13ffe0c3d6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-infra",
                "resourceVersion": "3665",
                "uid": "e0afb186-c501-49ad-b686-4d7d1b4a8934"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5801",
                "uid": "62d1746c-049b-454a-9eae-ca62c654ddd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5054",
                "uid": "5892857e-1754-4330-bd9e-3b74d306b5b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5160",
                "uid": "ce3046ec-9955-4a05-94aa-1289931ab50a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6249",
                "uid": "6316f4e9-d23c-4f6b-b923-0c89c555fa13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6048",
                "uid": "2883cda8-8a3f-447b-a9c7-5785214a6336"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5958",
                "uid": "e92c01ec-1818-4014-94c8-b08c9bb87b76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5409",
                "uid": "9f2b0a1b-012d-4261-b6a6-627ad3a8914c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6310",
                "uid": "5cecc298-918e-4301-81a1-1e7bcf2c928e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6021",
                "uid": "c8bd5d56-56b9-4351-b06e-98dd6e5716b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6089",
                "uid": "eb417f47-5009-49c5-8647-5f68e2ebe179"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6573",
                "uid": "32e574cd-b6dd-4696-b5f6-70c7ebe68e7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6559",
                "uid": "a78b30c6-b1ae-46a0-bd2c-d9a02d031622"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5298",
                "uid": "625b21f7-6122-41c7-a765-58f30764bfd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3712",
                "uid": "3e0f5829-a7fa-4753-9942-e5bfe4786418"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3721",
                "uid": "c8fb15a3-4423-464e-b65d-964e42263298"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3711",
                "uid": "97031762-3134-44a3-a4d6-ec23226c8042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5786",
                "uid": "ba02ceaf-437f-439b-b8f8-5a0b7c569ade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5104",
                "uid": "0340a23d-bcb8-4b0f-a7d2-9e5f19d02ef8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5108",
                "uid": "6d6cbf21-27e5-40f0-a59e-1c167d742ec7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6329",
                "uid": "f5364e04-dc80-4c26-aff1-826245e4ff32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5878",
                "uid": "718757e3-fc9b-4b13-b671-682d869913b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5835",
                "uid": "8cdefeb7-2da6-41aa-bd29-a0ab3406ff2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5450",
                "uid": "0489ce15-a6c3-4600-ae27-470395c0efc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6431",
                "uid": "7aad633e-0d16-4384-b0e2-c11e8e76876b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5983",
                "uid": "812a1d4d-fcdc-44ae-ac99-2db49c6ae9e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6127",
                "uid": "f997c81d-24e3-4622-b355-b563e012636f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6503",
                "uid": "23dfe26d-88d4-497c-8ca0-a83a725d6fbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6671",
                "uid": "e2fbad90-9fb0-43a6-ac4b-d215d267e2c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5391",
                "uid": "321831a9-8b6e-4728-8755-698da01ced0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:03Z",
                "name": "ingress-operator",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1419",
                "uid": "e5d5f32d-90e4-4d4f-82a5-8954ba9bdc9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:24Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2697",
                "uid": "393439cf-287c-4aa7-9584-2ab65c077140"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3734",
                "uid": "7d7e7500-ec60-4ca6-940b-c54dc661bee3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3745",
                "uid": "9c474fa4-c80e-4f09-b946-3af91f9bfc72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3735",
                "uid": "92749f5b-cc7c-48bd-8baa-8c3ca8d3e645"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5798",
                "uid": "e32c3239-e20a-4e7f-ab69-48f32f3a5954"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5049",
                "uid": "1be6ea28-2b71-4e51-acaa-627d0dd67c99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5121",
                "uid": "ddb1b5d0-f175-4ccb-b16d-9d098e2f69a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6404",
                "uid": "64a1477d-6176-44bd-994f-58368feb417e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6022",
                "uid": "4db19d77-6a39-4c0c-b2cf-b66b485c5497"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5833",
                "uid": "5e464a73-e5b3-48a8-b722-51652610b432"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5397",
                "uid": "295f6996-ecea-4d2e-97d3-4160ad4f123c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6306",
                "uid": "6095ec5b-404e-4256-9fcd-6cd00afad4e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6032",
                "uid": "ea273cc2-b6de-4d11-8d0a-414d655c6c11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "6191",
                "uid": "a58f0ace-9a14-4ff8-8298-b9aaa7953e67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6471",
                "uid": "9fd360f2-382c-4432-83e4-fae5c3d28a7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "6481",
                "uid": "cd02e269-482f-42ed-97af-fed6d0742e6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5178",
                "uid": "a49ce3cb-8b06-4397-b5d1-3fa40b81366d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:20Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress",
                "resourceVersion": "2494",
                "uid": "570c08b3-31d2-42b9-8dd8-70000acb056c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3689",
                "uid": "2f067d9c-fde1-4fdf-92ec-06d3165be60b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress",
                "resourceVersion": "3699",
                "uid": "db35bfc5-c9de-4985-b5b0-1af2e2eda3cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3688",
                "uid": "71e7fe33-1494-46d5-a3b2-9b41e3d8e295"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5695",
                "uid": "18d599d0-4235-4d28-a13e-844111dd803e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-insights",
                "resourceVersion": "4987",
                "uid": "42b4ffad-fc61-4adf-8180-5de114585c70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5172",
                "uid": "1666675d-1e9c-4bc2-bcbe-d9629cc7ea74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6416",
                "uid": "1e82a65f-de4e-4a2a-979f-90b951b81c41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5925",
                "uid": "3668a351-8a55-4ff2-a1b0-414b27a2d651"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5837",
                "uid": "bb3c4c17-daea-4eda-9646-c0cc4c1d4713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5589",
                "uid": "d065a039-f460-4c2e-a00d-b3edc8372ed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6410",
                "uid": "b301421e-fdc4-4226-8556-a40d99f04669"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6036",
                "uid": "3eda848c-6e3f-46d7-8a2b-50ba3f9dcafd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-insights",
                "resourceVersion": "6116",
                "uid": "e6fa283f-ee41-4119-bbd2-d22539a8cef6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6611",
                "uid": "dabb7086-dc7a-4ddb-b3e5-2057c16ff759"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-insights",
                "resourceVersion": "6509",
                "uid": "aa3ebcba-ae8d-4edb-b141-deda6120d3bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5324",
                "uid": "1f369079-d3bb-4e31-822a-439f7296f321"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:09Z",
                "name": "insights-operator",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1913",
                "uid": "dd0e52a4-6988-42b1-9d23-47400547db41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:10Z",
                "name": "insights-operator-obfuscation-secret",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1982",
                "uid": "2fc7550d-8f39-48b0-b3bd-093a974e8577"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-obfuscation-secret"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:14Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2205",
                "uid": "0d3e088c-bb12-4617-aae9-c79255774055"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:deployers",
                "namespace": "openshift-insights",
                "resourceVersion": "3758",
                "uid": "b235bbe4-27a8-46e0-8daa-0aafd7a4f3fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-insights",
                "resourceVersion": "3767",
                "uid": "bdac5a7d-f73b-4391-b06a-bfd47cd83882"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-insights",
                "resourceVersion": "3757",
                "uid": "6b6fba64-6fc9-43e3-aa9f-10ac63dfeedd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5749",
                "uid": "61194009-8de6-43b9-a7ae-7ae9ae9ed613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5127",
                "uid": "723c7758-7183-43de-a759-8cc93a57cc66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5070",
                "uid": "45959c6b-d115-4332-94cc-db1275a03c0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6333",
                "uid": "54254ad1-d393-480c-b8e5-8a1f3290d8d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5996",
                "uid": "3034f5f8-e152-4e1c-9e2d-4959ad49e783"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5947",
                "uid": "8781b10b-c8f9-49c6-879e-9db8015cce9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5498",
                "uid": "a5861832-e5b9-45e7-bb03-65b8de5e9f17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6368",
                "uid": "fdd9f1eb-1ee2-49ff-8677-d093549116b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6039",
                "uid": "29bc5d2f-a851-4295-a8ea-fd67ecb1c49f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6091",
                "uid": "0abe17a3-06eb-475e-9a83-dc9701e00fa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6597",
                "uid": "297f7efe-6d83-4fdb-8866-0af4221004d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6561",
                "uid": "f3e025ab-fc8d-423f-91eb-020bd56d1a4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5226",
                "uid": "21b40008-6c38-49da-b1f2-f2db4913c521"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:24Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2731",
                "uid": "0f63af94-abcc-477d-8170-4398d45f7f80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3800",
                "uid": "76c0083a-83d3-400d-b66d-954811745de6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3810",
                "uid": "1abc8905-f633-4c7b-bc68-678db17df9fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3801",
                "uid": "0f5723a5-47ea-4597-a7da-57034c742ff4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5684",
                "uid": "d687ec94-078b-45ce-a0f3-9de80a7015fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5057",
                "uid": "e4945c83-62b1-45bb-8084-4029deb7045d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5163",
                "uid": "af95ea06-9e0e-45ad-9818-02ee1b4bc718"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6382",
                "uid": "33e99d48-7219-4092-b248-005363ef2923"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6034",
                "uid": "9c73a9cc-05b9-487f-81a5-229b824ba432"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5883",
                "uid": "2ce3f146-8e13-47b4-9892-ff2a7e2b347f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5477",
                "uid": "1ee76d6f-10cf-4d48-bcce-6f8ddeeacb0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6323",
                "uid": "a27dfd3a-46ef-480f-adbe-80ba1706f1ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6037",
                "uid": "f6e24ea9-cb46-44e6-a233-83dd76e2f21f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6233",
                "uid": "60bd0744-36a1-4a36-b24f-87efef19002a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6582",
                "uid": "76f3d5da-16da-4d53-bf0a-e256c4ce9d8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6497",
                "uid": "bcd57580-2387-40fc-9509-a76c74462e00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5394",
                "uid": "9a2ea4ed-8c69-469b-998c-76db36811b3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3779",
                "uid": "84c3d059-007d-4b61-9ac6-b57f10067d76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3788",
                "uid": "9cf1f3df-5c57-45ef-91c7-162b65ae538e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3778",
                "uid": "1fc51db7-76a2-4dbe-8b11-f03e18368f90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5697",
                "uid": "c8b4dacf-d87a-4139-a6e1-9d1b5a9b14b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5062",
                "uid": "dff2dfb5-7b44-4485-942c-2269ff9b548e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5217",
                "uid": "335e387d-1d9a-442b-bd6d-c677347f804b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6363",
                "uid": "a6edbe4b-c2bd-471f-bfe1-ebfd6798b091"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5882",
                "uid": "e335bb50-a4fd-48a7-96b7-3b5c540b6687"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5877",
                "uid": "46d3067a-899b-491b-9dd6-bb0d3bee8ebe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5342",
                "uid": "9a91fc70-1572-46b3-a177-cb3032c3be2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6472",
                "uid": "b75a513a-f4e7-4596-a161-12bf5b221bea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6002",
                "uid": "a1cba515-81cc-4df5-b3f4-2dddaba03926"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6093",
                "uid": "2e7de86e-01e1-4421-a5f3-d8b83880c187"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6467",
                "uid": "223fa8e8-8438-47a3-891e-3cd021dae4af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6592",
                "uid": "41b0fc9b-e867-432d-bed0-79ebc747ab3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5399",
                "uid": "cf8f6184-a762-433d-b4e1-dfb1e842497a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "835",
                "uid": "ce1f630a-0e1e-4df5-9983-4fec72de957b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3846",
                "uid": "55d8a1d2-ee60-4be2-9930-0c6821ccca16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3855",
                "uid": "ae60826f-f812-446e-a22b-bacad7de5e6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3847",
                "uid": "b1e1d615-0d72-44b8-b82c-811784bd369e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5803",
                "uid": "c191c71a-7a0a-41b2-a020-93068aebd81d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5151",
                "uid": "976ea063-be78-401c-a54a-69b9e6a1e7d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5110",
                "uid": "dc2e5db1-cbae-41cc-84b9-a4c3106bbacb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6409",
                "uid": "cdf63fd4-a2aa-4adc-869e-82a8c51d4f7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5939",
                "uid": "ad70654b-a78f-4c3e-a52b-429215420927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5748",
                "uid": "ab272c33-a96b-42d5-9634-ac3a5b99c6f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5354",
                "uid": "39395111-04c6-4ac5-8fc7-147ac3e17b44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6458",
                "uid": "b8033e3a-c9e5-427c-b8b5-026e29e4c5da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6096",
                "uid": "2bb79b97-266f-4e8c-b633-95b8945b3496"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6071",
                "uid": "c710716c-4ac6-4383-8dae-abd933f42c33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6554",
                "uid": "6dce2446-8367-482e-b4e4-81cd9d029e0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6544",
                "uid": "b5a7b24c-67bc-4248-90c8-8cf222346a88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5396",
                "uid": "00b147b5-aadd-476f-a568-ab1cb6c04c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1760",
                "uid": "6337afd9-e2b9-4037-aedc-61afdb9032f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3823",
                "uid": "7d7440ab-e9eb-44a7-912b-901ba665c429"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3833",
                "uid": "1b73e346-2142-49c5-8e1b-ef73c0e23c71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3824",
                "uid": "85fe95c1-a1dd-4e88-9216-75b38e1eda26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5713",
                "uid": "6e68d8b0-5660-4c9b-8e41-974240b10618"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5106",
                "uid": "26708b78-ac9a-4f6d-ab73-cf73a78aa24d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5094",
                "uid": "ccb1b3cf-b108-4ebd-9c85-c6200d54fe94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6376",
                "uid": "9b819346-8cf5-4ff1-a91e-45def824eedb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5990",
                "uid": "1bc00eea-e818-465d-93ee-b838ed8fc0f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5863",
                "uid": "e58cb77b-a0ef-48fc-ae25-a09be274d423"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5359",
                "uid": "f53e99ec-bc0c-4714-b4a9-0cc91b3e793e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6334",
                "uid": "2d085d77-10ca-4d45-8e96-5b94e9815baa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6159",
                "uid": "01ed89cb-dda2-4a19-b886-ef6aeb234bac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6051",
                "uid": "75cda5e2-cc09-4a36-bee3-3879c5c96197"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6599",
                "uid": "42746f89-5608-48dc-8d4b-4de0615f56c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6659",
                "uid": "effac6c0-2299-47c9-966e-e12bff67149a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5200",
                "uid": "5d490e08-a367-4dd6-9c4b-9e61dcf57c28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "837",
                "uid": "7367210d-6606-4c96-a4f6-f6cbc4fd8e5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3906",
                "uid": "631bf915-d95f-4956-9a99-c6cb84d253d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3905",
                "uid": "3d0da0e7-eecf-42ca-99a4-a4e77055d817"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3896",
                "uid": "2ed1756a-d554-4e99-9f86-ed62336319b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5829",
                "uid": "f9b2a943-bb4b-4f8b-9332-a953da70507b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4931",
                "uid": "00c07bd9-7b42-4794-bed4-0bad7a8bf2ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5246",
                "uid": "df9ffcc0-5582-45dd-898f-a6b7ccb200ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6311",
                "uid": "0cb7393d-e99d-40b9-beef-9cd3a12f79fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5998",
                "uid": "efaa40b4-e011-4fc9-85be-4c0c37434c8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5839",
                "uid": "1f9c3a26-3668-4b8c-a584-5a58ff3ae69c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5528",
                "uid": "ef7185b5-b99a-4b46-954a-0bc8989c4ea8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6385",
                "uid": "50e78446-fccd-49de-b958-28284196ce68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6056",
                "uid": "023658e4-681d-4d62-a9a5-a2c8f5eb3efb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6201",
                "uid": "3859543c-7695-49c3-82ae-c70ec0d9d9b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6575",
                "uid": "beabedc9-ed19-4ff2-a9a1-ba843babeb4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6547",
                "uid": "08dc57ae-bd9e-4362-8738-b6d63216080d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5410",
                "uid": "30416578-428a-48ca-a71a-cdb5c6330484"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3872",
                "uid": "3bf5cd9e-a555-4a3e-8ea7-d87149b90726"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3884",
                "uid": "e0ec727b-c642-4b40-821e-68525591ced0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3873",
                "uid": "fb43741a-7e14-41f3-9c88-9494f96e5f95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5756",
                "uid": "dbf6e234-4b60-4631-9c1e-20f6c00779cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5091",
                "uid": "aa93b77b-d077-4e21-b16c-ae68c2f5dc89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5189",
                "uid": "cdcacdfd-c1c8-4b13-b31a-b7a55ba22c6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:56Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6313",
                "uid": "219e3abb-8c56-4cee-ac76-042a509c2c02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5979",
                "uid": "060a28ea-e26e-4577-8de0-cc41ed9f0174"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5753",
                "uid": "e5910220-c342-44d3-9f4a-e38288eaf090"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5568",
                "uid": "5de14455-f21a-4184-975a-d7fc0965fd7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6354",
                "uid": "5f27387a-7c03-4cee-8bd5-08b512c05524"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6041",
                "uid": "e2434551-3353-4972-9179-48941a5c64f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6161",
                "uid": "2e00c741-d383-4447-9af5-77d5e6596324"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6586",
                "uid": "555c0a41-b093-4f67-8dd4-e095ce9d8b60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6549",
                "uid": "22a27c55-b6fe-4e76-beed-1d2a801a3d95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5230",
                "uid": "9803f9fa-6755-4493-9f99-dc04e2d6be77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3918",
                "uid": "49a82566-8d1d-4073-810b-869701411755"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3927",
                "uid": "cfeee36f-f4e4-436e-aa5a-4736284d26a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3919",
                "uid": "c6019ad0-1cb2-46c4-b2a5-d4ef8de36402"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10603",
                "uid": "41fbde9f-2aed-4e6d-b8d7-a38b46747fda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:41Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10955",
                "uid": "b87d8ccd-fab8-454b-b4ce-b172f31e8bca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:53Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11599",
                "uid": "d6fd2828-8ae9-47bf-8c60-f7d2c329820a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:50Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11368",
                "uid": "266d4f61-7950-4560-8d41-45433fb60125"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10418",
                "uid": "6c0f65a0-e586-4cc3-bbdc-6bcafc2b304f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10861",
                "uid": "4f9ec115-8cc1-4159-a0ef-eea82a84346f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:44Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11040",
                "uid": "2784c042-211c-487e-96c5-5a14db413129"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10804",
                "uid": "854f575b-d01c-4b98-ba35-aa47332d5916"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10622",
                "uid": "8779ccd8-e20b-4189-9620-d5dbf392395f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11669",
                "uid": "1880e504-266c-4936-9b86-6f2a60906958"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:28Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10685",
                "uid": "024ad7bb-5dae-4fc5-b8e4-1a4e2920e698"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:40Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10940",
                "uid": "83bd9d19-e41a-4494-8476-d67e8d0bf529"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:44Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11031",
                "uid": "d313f401-d15e-45db-a93f-263a71a306f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:23Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10456",
                "uid": "d41231b3-4d21-43d6-abe3-bdc469d853c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:23Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10457",
                "uid": "b9810e02-1e91-4039-a7f6-b14db56ac5d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:23Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10448",
                "uid": "ea851d45-2f35-482b-b144-67512f060c2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6187",
                "uid": "1e2385f4-4199-40cd-8553-da3157e5d1ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6190",
                "uid": "69551c27-081b-46aa-be79-3e2454b5650e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6891",
                "uid": "76ca638e-46e6-46ef-8e47-6f25c32dad20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6768",
                "uid": "66f6b3ae-2469-4ceb-a58b-3884c7cdd300"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6764",
                "uid": "4a17ad21-35d3-4a0d-a01e-cc5795fa6248"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6270",
                "uid": "2c1b95c6-7fe9-42f9-8125-54481240fe0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6898",
                "uid": "61a5922a-ed4f-43be-a543-e88773dc7be5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6888",
                "uid": "87297a84-6047-416c-bb0c-0ecc9a2a5e18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6843",
                "uid": "94787388-98db-4032-86ba-8b1de4c6b431"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6370",
                "uid": "f9246328-015f-4f87-bf12-b0a55ba57949"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:39Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6924",
                "uid": "e451a820-f425-432c-9eaa-cba408a82a7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:42Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6939",
                "uid": "857b8ab6-0ad7-487f-b4ab-6f060973bd55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6506",
                "uid": "66da7eea-54a7-4a53-b959-42529737f3d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6483",
                "uid": "435389a0-dac9-4503-bc12-63cab91d2e68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6860",
                "uid": "bdcbb1d1-985f-4212-8c2e-8a9385718f44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "openshift-logging-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6195",
                "uid": "b3233dfe-9aa2-4b58-9d3f-f27d84465499"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "openshift-logging:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6200",
                "uid": "9cfa8f2c-f98f-4963-acc8-4a8473e4f319"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "system:deployers",
                "namespace": "openshift-logging",
                "resourceVersion": "6181",
                "uid": "dce0f7f9-ee4f-45c1-a1c1-0f067bdee0c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-logging",
                "resourceVersion": "6180",
                "uid": "54b93a00-ae77-4279-97ad-31f7880d3855"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-logging",
                "resourceVersion": "6184",
                "uid": "1238a2e3-e8be-40ca-ad05-92afd1c51655"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5850",
                "uid": "48496805-3072-4ff3-8702-f64c70ab8993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5030",
                "uid": "e9e7d82f-73f7-4e22-88c2-9b1f8e46cdb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5140",
                "uid": "9bcf3d0a-2baf-4287-b8b0-d9b4d236152f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6264",
                "uid": "161b2cb9-5271-4f0f-94ed-f635e59d8fb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6024",
                "uid": "e036a42d-608b-4bc7-8c62-742599f256d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5823",
                "uid": "4cd97c3c-ab93-4631-b804-86d28a9ab572"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5531",
                "uid": "25b3bf2a-c01c-41ec-b711-39e71e8b963d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6412",
                "uid": "b86989d0-f83c-4920-8018-75aef6a2a84e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6141",
                "uid": "88d9732f-2d30-4c9e-8e33-81f12e4c692c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6067",
                "uid": "b0652919-54e5-4f4a-92bf-06c299a17bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6450",
                "uid": "095aad38-9366-42d8-9ff1-ca56dd3831d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6567",
                "uid": "ae03c5e3-916f-41c7-ae34-ccaf3d802384"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5205",
                "uid": "cca83a72-e66e-4960-84e1-8f094c8aedef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:58Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1199",
                "uid": "4db361ca-7dd4-43b6-9319-08439ae9f056"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:50Z",
                "name": "cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "819",
                "uid": "60e4a006-3aab-46bd-9219-b55ccaeffe1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:58Z",
                "name": "prometheus-k8s-cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1222",
                "uid": "79d99b23-3c13-4155-b881-b88fe48bc543"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3940",
                "uid": "59b710e4-5657-4d4c-8048-f135eb3e28a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3949",
                "uid": "027060aa-409b-426c-aaf6-5100ad43cb48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3941",
                "uid": "eeb5b5e8-cb89-4bc8-a7de-e5d816db9aaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5805",
                "uid": "16120b5c-63b9-4b97-8d7e-26b6a5fe8998"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4949",
                "uid": "7e765e42-ce35-43c1-b05d-2873a61313cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5222",
                "uid": "ba4053b3-bb5d-4c65-898d-d0e8c6189b6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6336",
                "uid": "4891d61c-7649-4f2d-93df-e0b715ce60eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6050",
                "uid": "4fc47806-3eb2-4d99-8f5f-cc29a9b4f4d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5948",
                "uid": "f8a575b9-98cc-4b48-bd02-5d23ba777b17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5570",
                "uid": "761140f0-9ce5-4d64-a557-565515a2407d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6433",
                "uid": "54a24ee7-567e-4dcd-a6cf-467a8163fe4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6079",
                "uid": "4cb9cb09-27e0-4d0b-b294-458dcc98166b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6103",
                "uid": "955d58f4-cc70-4080-8d10-a26c27a388a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6492",
                "uid": "c1e6ac4d-156f-478f-9f3d-a68716c81d15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6621",
                "uid": "6e4b0b15-ca68-4a30-a1df-3256d4d9fadc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5343",
                "uid": "f92f30c7-36b3-46b4-8641-deedb8cf72fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:54Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1028",
                "uid": "d911428e-82a7-46ee-aa26-0cd0ede3a90c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3963",
                "uid": "46f0ab9c-daa7-4815-a116-e8674b2dd3a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3971",
                "uid": "12085722-8989-42da-b5e2-f6190996f5ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3962",
                "uid": "02c4c25f-3b76-4508-a1f1-7649712fa894"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:52Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "03dabd08ddba15f575168653b704f77a8a8f37b7d692dad9ab1e8c21369ceb0",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "03dabd08ddba15f575168653b704f77a8a8f37b7d692dad9ab1e8c21369ceb0",
                        "uid": "7de777c2-41fa-41c3-b4ea-ad33c278ecba"
                    }
                ],
                "resourceVersion": "15449",
                "uid": "2b323c23-5b5b-411e-9a0e-f5736a1eae5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "03dabd08ddba15f575168653b704f77a8a8f37b7d692dad9ab1e8c21369ceb0"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:52Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f",
                        "uid": "a0ff348b-db60-42ac-bb37-3892f2bf13ef"
                    }
                ],
                "resourceVersion": "15437",
                "uid": "e59d2a5a-45ad-446e-be30-a9e3e5856c6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:46Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3",
                        "uid": "fd3d3f26-ce46-4f2e-9d16-24188ca302ca"
                    }
                ],
                "resourceVersion": "15217",
                "uid": "6e65e3b3-ab78-475f-9b77-ba798ab96bb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a",
                        "uid": "1a0a73a8-726b-4c8c-9917-ba3c1c6232c1"
                    }
                ],
                "resourceVersion": "15337",
                "uid": "8a7e5483-7b23-4bb0-8e71-fb34ee3dd27f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "5bfc73bccd2cef20bb9afe324d112069530a83adee9f41e094fba66f6e709a8",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "5bfc73bccd2cef20bb9afe324d112069530a83adee9f41e094fba66f6e709a8",
                        "uid": "5f6802a9-9029-48b5-ac7d-37c1c37eca49"
                    }
                ],
                "resourceVersion": "15312",
                "uid": "e822265c-2ec9-485e-975e-4c47b005d6b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "5bfc73bccd2cef20bb9afe324d112069530a83adee9f41e094fba66f6e709a8"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:46Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43",
                        "uid": "7aa340e1-7f07-47d3-9be5-b1f20a05d506"
                    }
                ],
                "resourceVersion": "15227",
                "uid": "208b0c6c-af02-45d6-8ea2-e562201bb18e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5761",
                "uid": "fc641363-0dd6-4a32-b4ac-bed5a542011c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4951",
                "uid": "5432512e-d00c-4a49-a5f3-3628a23f3dae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5084",
                "uid": "961a9bcb-8b3a-496b-a62d-10d4d630c8b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6378",
                "uid": "07c8f76c-499c-4a31-a31f-3024c3ca3bf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6038",
                "uid": "e11d85b1-ea7a-4dd3-8d71-9d913e1ccbca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5902",
                "uid": "e522fa30-a3d8-4b94-a606-84c8be2efd90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5574",
                "uid": "c0ea4c64-1c96-4830-ad91-cceaaa016c16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6415",
                "uid": "2c8b85aa-bdce-4a9f-b207-f0c74d207832"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6043",
                "uid": "1fa5bf87-9094-4a02-a177-728b91a05b04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6140",
                "uid": "049db740-a99c-40e3-8b30-d2abdbc49923"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6514",
                "uid": "5b430d05-0ed4-4db8-907b-d25804231284"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6536",
                "uid": "8c074d1e-964d-40e9-bc8a-51c1f3c88378"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5231",
                "uid": "56d24e5d-b035-49e2-a9a1-dadfccde5c7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "dedicated-admins-openshift-marketplace",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5687",
                "uid": "6602ee0c-8558-404a-929b-2141fad63861"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-marketplace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:deployers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3988",
                "uid": "020d6d20-3c76-4c7f-a23b-a24c05d9b306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3998",
                "uid": "d53512e6-f211-4054-8902-8f3be9e02b87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3989",
                "uid": "32fc333f-d8b2-4973-a8fc-bb77610ca349"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheusk8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12269",
                "uid": "ff31869d-591c-48eb-8344-564456655c64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5788",
                "uid": "7820e453-579c-4775-b3b1-0a43a14b64a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-cee",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5526",
                "uid": "d505a950-b97b-4479-aad9-e08a1ea616ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5117",
                "uid": "cc7c7f5d-0624-43ec-a98f-ee89b653712c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5130",
                "uid": "4c3d8d54-9051-4a72-b282-218b939ca194"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6236",
                "uid": "f4111328-c954-40fd-b102-3c272465b909"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "backplane-lpsre",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4849",
                "uid": "6486d654-52ad-4330-80ac-18c2f6287245"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5885",
                "uid": "94cd2cca-cbcf-4dfe-a570-cb41f1aa7a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5851",
                "uid": "4aa94ad0-8016-4122-880e-5ba2082c2142"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "backplane-mcs-tier-two",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4802",
                "uid": "88dde790-f8b2-4c31-a36a-5ab35f685364"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5575",
                "uid": "0ae136f3-40fd-430c-a802-6d89e188c81e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6394",
                "uid": "d1afc06a-8c0c-4749-8b56-6c0088ce0132"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6130",
                "uid": "f541d644-5505-408d-a1fb-5a8c4106da6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6182",
                "uid": "cddc8ea1-3231-4f3b-821e-ce42b346a44d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6455",
                "uid": "ec8b2404-fd47-4aed-a933-a40cdaa44547"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6598",
                "uid": "c5c04447-44b3-4a5c-b93a-eafc5f65ee45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5208",
                "uid": "787633bf-8831-47c5-915d-e22bbcbab45f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:06Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1710",
                "uid": "40f01f64-b143-4893-9e76-48ce05176457"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:07Z",
                "name": "cluster-monitoring-operator-alert-customization",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1804",
                "uid": "8db7eb8c-863f-496d-8b91-6c10b8a24b29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-monitoring-operator-alert-customization"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:13Z",
                "name": "console-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2158",
                "uid": "ce4abf00-6422-4e2a-bb65-1e77deec5ac6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "dedicated-admins-hostedcluster-uwm",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4948",
                "uid": "f532bfb7-c941-48c8-a772-1206a5ec643a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-hostedcluster-uwm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:03Z",
                "name": "insights-operator-alertmanager",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1443",
                "uid": "24d9752f-ced0-488f-8961-3f26393202a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:04Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.5.0"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12408",
                "uid": "8650389c-e1bf-43a8-b55d-b431e50daf99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:04Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.5.0"
                },
                "name": "prometheus-k8s-config",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12428",
                "uid": "16b9f6b2-c02c-4805-931f-81bdd37725f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:13:17Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tsf-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tsf-tas",
                "namespace": "openshift-monitoring",
                "resourceVersion": "21939",
                "uid": "3a596f1d-6e49-4587-b2a9-bcd532116ea5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-segment-backup-job-tsf-tas"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:deployers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4013",
                "uid": "33564900-d978-4be9-9805-6910fb52e5b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-builders",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4023",
                "uid": "4b9d7264-0d82-4c40-a9ec-3325db4d431b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4014",
                "uid": "859f53e8-5a73-426e-b750-2f0ccc184a57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5852",
                "uid": "efa12c85-4d3e-4c3b-8fe9-515cd9625bcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5068",
                "uid": "ce7fa553-b155-41af-8ae0-cece7c6f8b66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5175",
                "uid": "47ec2c19-28df-4f0b-956f-0a9b39acaf2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6427",
                "uid": "13c9b988-e6cd-4fad-8867-a8d633e9f942"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5911",
                "uid": "d9dbe099-3311-465e-836b-957baa211573"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5842",
                "uid": "21baf647-6d8c-44bb-be92-4e6bdaf06a81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5401",
                "uid": "8c2fe47e-ee75-46ba-886f-a1f6ed6ecb22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6326",
                "uid": "3c57d47d-5835-4b20-886d-b4aa15c8e087"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6110",
                "uid": "4ebd4b9c-16eb-4c3a-b702-42e5f58ed912"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-multus",
                "resourceVersion": "6129",
                "uid": "8dea1194-ecd0-4395-aff8-6e03019dd177"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6558",
                "uid": "4d53dd1d-5ec9-4643-b0a4-c13884ef24c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-multus",
                "resourceVersion": "6595",
                "uid": "3c74de6c-d8b9-4b51-b6e6-95128e8fccb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5381",
                "uid": "0f739f4d-6d4d-45c3-9a40-da5ed5a67591"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:35Z",
                "name": "multus-whereabouts",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "3473",
                "uid": "f722f799-b92f-4cf2-ab01-bbf46dfb272d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:38Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "3868",
                "uid": "db5bb9ef-880d-4a79-9a61-dddd409778b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:deployers",
                "namespace": "openshift-multus",
                "resourceVersion": "4203",
                "uid": "31a7b7e8-1ab0-462e-a0a7-873a8d466eae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-builders",
                "namespace": "openshift-multus",
                "resourceVersion": "4204",
                "uid": "4be3d600-8094-4a91-a4c4-b641fafbecd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-pullers",
                "namespace": "openshift-multus",
                "resourceVersion": "4192",
                "uid": "af219450-0d2c-460a-8e52-411487a20e8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5770",
                "uid": "ef11f4e4-2fd1-4600-af37-4363e8b43d9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5119",
                "uid": "24bc969a-cf4c-450b-80fe-cf36ab62c6c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-cee-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5532",
                "uid": "0ff1feb8-0992-449e-a808-0786abfe4c9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5142",
                "uid": "a6a51622-1063-43d9-a86d-a8e23a9e15c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6240",
                "uid": "983913a0-270b-4a2c-b67e-a7000a6ceaef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-csm-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5571",
                "uid": "89ade99e-68b8-4715-96f6-66436cc67c0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5975",
                "uid": "ae1cf1d7-c63e-4e74-8559-fc40ed62022a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-lpsre-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "4867",
                "uid": "7ebb566e-c3ef-4ac7-beb1-d41c9cb0cb5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:32Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5816",
                "uid": "b0c886c1-fa54-4afd-82cf-02b324624615"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5387",
                "uid": "aeeb30d3-d251-4425-93dc-d36b60bbf6df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:15Z",
                "name": "backplane-mcs-tier-two-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6716",
                "uid": "aa8e9e06-74e6-4847-977d-5665030a3848"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6445",
                "uid": "aaf77bc6-c30b-440b-9384-ef2f30fde50c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-mobb-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5725",
                "uid": "3f99f805-3fea-4a95-ab5a-c47792e9bf4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6074",
                "uid": "4b564c20-15be-44ae-b59b-472eb5abc7b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6068",
                "uid": "ca50100d-7aa8-47e5-a0b7-c8307952d19a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6707",
                "uid": "f8abe41f-71a1-45f5-9594-65507dc4270f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6473",
                "uid": "3864da92-71fc-4373-af09-d43795dda1a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6500",
                "uid": "f3ddf998-9652-4596-a296-90d77d157501"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5402",
                "uid": "37c3eec3-d185-478b-a126-0bb22f021375"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-tam-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "4896",
                "uid": "2d008bbc-18cd-4289-8a98-38fffad3aa50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:deployers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "4851",
                "uid": "fbb2c090-aa4e-455d-b5d9-5784abdacbfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "4850",
                "uid": "62442cfe-d80e-4b3b-9190-958c3dab23de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:59:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "4848",
                "uid": "31fdff84-43e4-411d-940a-b500c7459824"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5809",
                "uid": "c23319a3-aa3d-4471-a6d7-8b50b591f03f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4898",
                "uid": "08f224f0-af9b-4e30-b50c-b46246d439c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5132",
                "uid": "018a5cfc-3ac9-48d0-9e6b-4213ea13a61e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6355",
                "uid": "dbabb3e8-f1d7-43b4-b5a7-d71200ded6dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5914",
                "uid": "00264a1a-0ac1-4738-a3ea-d576d921f4e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5879",
                "uid": "eb398c6a-d666-4bb3-9441-8579731cd2e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5369",
                "uid": "24566706-b3ca-4597-b48c-202f837f2941"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6356",
                "uid": "89b94ae3-4869-4844-b6a7-021e0bd6027d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6097",
                "uid": "26591b26-446a-4a03-bb6a-f13d45d17696"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6194",
                "uid": "d5766b98-24f9-4185-9f9e-bf77f5ae27b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6560",
                "uid": "8a37f70a-3e7d-48c3-8f1c-870beeb76e1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6623",
                "uid": "c99ede82-3cf7-402d-81bb-bca521434665"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5266",
                "uid": "aae2c03a-445e-49a1-8b32-86f9fa5e5ffb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:54Z",
                "name": "system:deployers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4522",
                "uid": "6067e0a9-2d3d-4fea-a7ee-a57037e18bc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:54Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-console",
                "resourceVersion": "4521",
                "uid": "b122a39c-0064-4e67-9cb0-1dbee86e21e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:54Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4510",
                "uid": "06ebb5e0-72ad-45de-831a-8ac150b85455"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5811",
                "uid": "aed5642a-c9cb-4f3b-8e2b-47592c397c2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5038",
                "uid": "70de3a36-8514-466c-be01-81a132af7b89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5227",
                "uid": "d3166569-380b-4cd2-a59a-7c181fde1ef9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6358",
                "uid": "919ca82b-64ae-42ac-b133-4c48b0150978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5941",
                "uid": "1a514f27-b4c8-45a4-94f4-a8407276855d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5933",
                "uid": "5f52fb35-abad-4f15-81b0-036f3cf7669b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5577",
                "uid": "947d7f2e-59ba-4a9c-bcfc-88bbf5878a7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6364",
                "uid": "bd83e214-b8d6-40a6-9164-f4bedbbfb628"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6059",
                "uid": "02e9380a-ec87-4ace-bbac-bd549031fcee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6203",
                "uid": "e7879b66-1c79-47e6-9453-43d220cad1a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6518",
                "uid": "709f4f0a-7f31-4f4f-8755-20fe9bbbaeeb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6601",
                "uid": "3401dd9b-9f2d-4f0a-b5ea-c7365c135b58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5382",
                "uid": "04def343-8167-4e56-b42e-46b0d77b13bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:48Z",
                "name": "network-diagnostics",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4351",
                "uid": "9c4fa02a-2453-4436-a78b-41039ab9e92d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4372",
                "uid": "ffdcce21-1c15-4c99-80e9-b4f0f2203554"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:47Z",
                "name": "system:deployers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4342",
                "uid": "f9c53395-948e-4929-9389-d300b15335e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4340",
                "uid": "d1cc4f4b-4e8c-40e2-8915-c6259b30d4ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4341",
                "uid": "2996f57a-d89b-4f9c-a172-20e56934fae2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5729",
                "uid": "92cf25e8-aa06-4170-bece-c2860e02984a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5093",
                "uid": "652b3926-9e17-4911-94c1-f2095bc96c06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5218",
                "uid": "9981423b-0086-4ec6-bcda-42fcc7833dc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6393",
                "uid": "a0335c63-323b-434b-9f60-a42ed5e98ac2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5944",
                "uid": "e021e8fd-b660-4ba6-a603-4b925c377bee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5764",
                "uid": "2344527d-2541-4538-ad3a-a9b8cf779ffb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5579",
                "uid": "b6b2f436-1c60-49a6-9818-ed8c28226a8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6335",
                "uid": "f59ba733-c0a7-48f4-97d7-56243b7b9de3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6148",
                "uid": "ba2d37e1-fdc5-454f-a3ae-73e384f78066"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6132",
                "uid": "13679d55-e131-4f7c-8138-f793693e2867"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6583",
                "uid": "86aade8a-3d02-4658-ac6d-d46f21bbc471"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6701",
                "uid": "6de14686-c6d1-4441-9d73-3a8a66e5b1aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5212",
                "uid": "d3aa5404-4217-4b86-a3bf-0b1f0bb2d83a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:51Z",
                "name": "network-node-identity-leases",
                "namespace": "openshift-network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4408",
                "uid": "24108d4c-89d7-4e06-b978-5c089dc10837"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-node-identity-leases"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:51Z",
                "name": "system:deployers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4398",
                "uid": "72d52423-3e3b-4d28-a4fb-5fe73a99d1c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:51Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4397",
                "uid": "ca562329-dd4e-49f6-ba09-31e0817c534f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:51Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4396",
                "uid": "d6149219-9a01-4908-87df-7f7a53f1d370"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5681",
                "uid": "c151544e-7d7e-42ee-96dd-ec8336a857ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5109",
                "uid": "7ed04f34-e0d9-47c7-b5d0-677cabf8cc61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5096",
                "uid": "efd73e36-0f98-4181-8909-7779ac201c7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6242",
                "uid": "e6e87525-67a5-4cd9-8350-210745a3dd94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5916",
                "uid": "d1a1279c-bb0b-4847-bcbd-16be532070d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5845",
                "uid": "b2d2810d-8f2e-44f6-a67d-5a485b4410fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5591",
                "uid": "8dd4be2d-8242-444c-886d-f839d03a1ced"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6328",
                "uid": "d25d747e-237a-4b0c-a99c-c4edae5c1215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6112",
                "uid": "44bda51a-10a7-42a6-870b-68d316d712a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6053",
                "uid": "94820b6f-7504-4a7b-b197-ebe47628de1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6612",
                "uid": "f471baa5-fe47-4ba7-ad5a-2ef383eec16b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6602",
                "uid": "1fc18f88-dd0d-4872-a824-b48ce575ecde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5404",
                "uid": "a32c4f35-3ce4-4197-b12c-c64498e0bd47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:03Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1413",
                "uid": "b5382ffb-7782-4ef6-9303-8a0a502b1bcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:deployers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4038",
                "uid": "aabcaf7f-17ac-4c96-96e6-e8e539f18116"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4048",
                "uid": "f7db4b3e-c0d0-4da9-8dbc-565292fbe0c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4037",
                "uid": "46dc3bdf-5993-43d6-8aea-d6a9442816fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-node",
                "resourceVersion": "5774",
                "uid": "0a322c1b-86a8-492d-92a2-98c75261c651"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-node",
                "resourceVersion": "5135",
                "uid": "23749e94-c099-4a3d-8fa4-d480c32ef1ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-node",
                "resourceVersion": "5225",
                "uid": "d3e1b732-05af-4e9f-9244-6a1f53fe9e19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-node",
                "resourceVersion": "6429",
                "uid": "8fddecfe-d4c4-4b3a-9920-139586fc6355"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-node",
                "resourceVersion": "5892",
                "uid": "24979108-c59c-4825-8a8f-6a4bfd68d4b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-node",
                "resourceVersion": "5961",
                "uid": "878b59d9-26bd-41f0-8db1-2773933079f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-node",
                "resourceVersion": "5541",
                "uid": "872a8192-7237-41ad-b7ea-06052423dfb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-node",
                "resourceVersion": "6435",
                "uid": "c1daa4db-3d75-4806-a8c4-c5c5dcfe8b61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:43Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-node",
                "resourceVersion": "6045",
                "uid": "8d2d84f5-8fd5-4bdf-b686-18c6d78224f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-node",
                "resourceVersion": "6055",
                "uid": "32d0aaed-900e-4f92-adef-b0aa327262bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-node",
                "resourceVersion": "6542",
                "uid": "0ffd6f5f-8701-4c81-bb6d-b5db6481da34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-node",
                "resourceVersion": "6486",
                "uid": "96fa8577-faf3-4895-b74a-19a3a22fa215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-node",
                "resourceVersion": "5336",
                "uid": "50766c74-f74e-4207-b0f0-e1eb431c8658"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:deployers",
                "namespace": "openshift-node",
                "resourceVersion": "4061",
                "uid": "9fe0fb5b-aa69-46f1-bbe7-a2f72283cec9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-builders",
                "namespace": "openshift-node",
                "resourceVersion": "4070",
                "uid": "1d741377-5394-42bc-a210-d96a76d9a5b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-pullers",
                "namespace": "openshift-node",
                "resourceVersion": "4062",
                "uid": "df9a5d61-7f8f-4ba9-87cd-980ad0f48603"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:54Z",
                "name": "system:node-config-reader",
                "namespace": "openshift-node",
                "resourceVersion": "475",
                "uid": "26901bc5-f79e-49ce-8d40-8c241e618bec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:node-config-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5775",
                "uid": "a6fb2426-1deb-4899-b232-a63fc0cb4150"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4935",
                "uid": "d756121d-7cd2-4749-8fae-98167cd4cc66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5086",
                "uid": "340c3b70-aec8-4fac-b4b9-97e0a5b2a9f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6417",
                "uid": "21ec2f70-2383-434b-9ae4-62361a90187e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5900",
                "uid": "7b36fd7d-8286-4e1f-b8f9-1a5938c4091d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5952",
                "uid": "83be7905-4848-4cc2-a5c0-f22bc81348a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5533",
                "uid": "d0478108-1c16-4b5f-aa63-78e3f7f05ba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6397",
                "uid": "6c1e4f64-3faf-4fd8-b115-e0da7b08ca1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6150",
                "uid": "4cd50ba5-c690-4f97-a670-bf5d8ed64c34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6105",
                "uid": "31205a1f-0e15-44ed-adab-5ce664253092"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6576",
                "uid": "7f818b9e-b6a5-4b61-ba03-bfea3a9a41c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6538",
                "uid": "99493f5e-78fe-4e37-8401-9260e8cdd200"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5406",
                "uid": "f49417db-eb5d-40cd-83fd-045894a5f556"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:deployers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4084",
                "uid": "b5bc6e77-389b-4da8-9665-d6452fe228b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-builders",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4092",
                "uid": "77d502a2-ccf9-48c7-a5f0-762e42e83f46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4083",
                "uid": "e7120c03-9f05-4b6c-ae6c-8e09d3c173bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6646",
                "uid": "32c050a7-2a0c-43b6-a6a7-8416fac38bb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6648",
                "uid": "779fc029-4239-457a-8b10-6f01fdafb645"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:31Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6884",
                "uid": "e42e9214-46a7-4fd2-bb98-24aa7424664b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6718",
                "uid": "7d124594-7df9-4f14-bda8-dd70e04a6eaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6739",
                "uid": "48327366-0e4b-43d6-a5b3-75076b92b58c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6949",
                "uid": "f602a7a9-b7f3-4a87-a34f-76d845cf5c6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6912",
                "uid": "0a1cefee-6d54-447a-8522-5ec9b6b2b9b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6886",
                "uid": "5718124b-c67c-4022-9d66-8524f1fa75d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6853",
                "uid": "35820ab5-0c08-4532-918d-7a0a8a479412"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6959",
                "uid": "72106561-595f-4aba-8d58-14ca49ee7c09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:35Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6908",
                "uid": "78bc49a9-522f-4e9c-884f-5335008d823d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:43Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6942",
                "uid": "9dbed2c7-fda3-487e-b877-660226d11f1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6968",
                "uid": "0a7ec436-308a-4fdd-a2ee-9811627d03e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:49Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "7043",
                "uid": "3bd38291-406d-4918-8c42-07576d2b44c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6851",
                "uid": "09a16c6f-9752-4ea8-9a47-c3f3f9052361"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:40Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6930",
                "uid": "7d8b0d66-8b6e-4bbd-9175-c76e0eec8c9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:40Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6931",
                "uid": "64b9f4c0-931d-4f3f-9872-c58c71e825c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:39Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6927",
                "uid": "4320b761-6746-4cc2-912b-4048c9baf2e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:39Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6928",
                "uid": "9c57f260-3955-4f29-96fb-416907cb28ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "openshift-operators-redhat-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6652",
                "uid": "ab8b996a-30d6-4e54-9751-f663a0b43295"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "openshift-operators-redhat:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6655",
                "uid": "22e24787-88ed-4b7f-b282-5f87a88874f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "system:deployers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6645",
                "uid": "cebe053a-bcf3-449c-a7e5-ab19f153bed4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6644",
                "uid": "9f47471e-4909-480a-9e52-0a4eaad0f6e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6647",
                "uid": "f1215b13-3e16-4f38-b2e4-fdeaa8290457"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:30Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5791",
                "uid": "ad68f16b-e1f0-440f-ba28-fdf99fac4293"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5113",
                "uid": "e9d2f2d2-97b0-4767-bebe-83e882cff37a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5071",
                "uid": "060e2f1f-2973-4a27-ab33-4b8bb728ac15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6272",
                "uid": "4fe60134-f25f-4a61-80ff-a366128b72c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5917",
                "uid": "bf2d9f7f-04b9-4368-a0fd-f733c6cb5071"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5755",
                "uid": "6723935f-9bee-4bcd-b9b8-8f4648373266"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5493",
                "uid": "71a801f8-f108-4c26-ae05-f30e3821666a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6402",
                "uid": "4e5c9398-3509-4def-9528-3f81241f158a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5991",
                "uid": "68bc8f0d-7e37-4455-90f1-962fd873abb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6095",
                "uid": "1cfd2dd5-98bd-49b4-9f3c-7579dfb162a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6494",
                "uid": "82c712f0-4d00-4f7d-8cfd-cadb48e5d616"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6521",
                "uid": "4fd5fc62-d852-489b-9b97-41ac0e97f355"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5181",
                "uid": "eb2673f5-faf2-45cd-9052-4b7477401a29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6273",
                "uid": "584ac03f-b62c-4ae8-b1ae-54552d49fcb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6279",
                "uid": "318b4efa-d783-4caa-8143-0a60cfe72389"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6265",
                "uid": "f94f30ea-1ccc-4c45-a61b-47779ac01e61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:54Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6269",
                "uid": "f792a2dd-8eaa-4c5d-a195-a2c6a5606adb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "dedicated-admins-openshift-operators",
                "namespace": "openshift-operators",
                "resourceVersion": "5680",
                "uid": "38202299-3458-45e8-9a08-75aa0711cadf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-operators"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:12Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-prometheus-k8s-read-binding",
                "namespace": "openshift-operators",
                "resourceVersion": "16460",
                "uid": "7aaae263-fa2e-40bb-a65b-74150cbbb847"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:11Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.4",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-pipelines-operator-rh.v1.20.4",
                        "uid": "8ad2eefe-1f63-49c1-9b9b-0b030ed809ee"
                    }
                ],
                "resourceVersion": "16269",
                "uid": "826bfe20-0ff4-43c0-9780-f6b512b7d557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-rh.v1.20.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:18Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.4",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtas-operator.v1.3.4",
                        "uid": "af9601f6-ce24-40f5-870f-e771ba0b2e60"
                    }
                ],
                "resourceVersion": "17207",
                "uid": "8c71344a-b913-424e-985c-e5b93ae500ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:24Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "i7bTIKZBx8FqjvSrhZBs4xBUckmilYzg7RKFC",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtas-operator.v1.3.4",
                        "uid": "c28bba45-d826-4cb4-a6da-90e999cceb67"
                    }
                ],
                "resourceVersion": "17700",
                "uid": "10ce1585-6377-4a88-9323-3ae037a22df6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:deployers",
                "namespace": "openshift-operators",
                "resourceVersion": "4103",
                "uid": "528b678f-98c9-48cc-a31e-fa7db4b19f7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators",
                "resourceVersion": "4112",
                "uid": "13465e41-e226-4804-bcee-de78fa687afd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators",
                "resourceVersion": "4104",
                "uid": "4ebdbc95-21d7-4073-bb79-f167b708eee1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:14Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "olm.managed": "true"
                },
                "name": "tekton-operator-info",
                "namespace": "openshift-operators",
                "resourceVersion": "16807",
                "uid": "83a4290a-cd20-4c69-a3d6-519f8c3deb37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5857",
                "uid": "6cb9530e-d2ef-4ea7-80b2-385dc5ebebab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5077",
                "uid": "002d774b-3764-429a-a0e5-221ae4173b89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5192",
                "uid": "6acb3bd4-4ed9-4cdf-8e47-35e9b6bbdaae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6418",
                "uid": "7e137fed-b985-4158-8cc4-60f08dfbf565"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5977",
                "uid": "547ca3d9-b2cc-4b8a-8fab-719947d46b22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5907",
                "uid": "ed3017a2-4cfb-43e8-abd9-d5e1bdb560ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5452",
                "uid": "9ad411d0-a134-4a30-86d9-95785cc6282e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:57Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6338",
                "uid": "b3684629-8d97-4d79-9aa6-b749a29be2f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5986",
                "uid": "4c1e5aa4-917e-4c1a-b3a1-d8407d9b33e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6231",
                "uid": "79bac68d-de8f-4856-a257-ccb3d3e1835d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6579",
                "uid": "a2a46af2-ed8c-495e-939b-7987418b0a6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6569",
                "uid": "d8ba99fb-360a-443f-af1a-cbaa8c8fb14f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5248",
                "uid": "f07795d1-4a57-4a25-8811-1977e4c60d8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:44Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4267",
                "uid": "2ebb8698-98fd-45f7-98bf-f0e03c582339"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:42Z",
                "name": "openshift-ovn-kubernetes-nodes-identity-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4240",
                "uid": "b1ebf6f5-0963-4c32-b649-f11970e33831"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:46Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "682a6c86-0f1e-42cc-8cbb-864a584aa063"
                    }
                ],
                "resourceVersion": "4297",
                "uid": "602d87c5-6a6e-44b6-bddc-8dc10814a354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:deployers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4227",
                "uid": "a06e29b1-a4f8-4df6-b2a2-c44f62d778a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:42Z",
                "name": "system:image-builders",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4238",
                "uid": "093816d9-fa09-485b-b67f-91942c150d66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4228",
                "uid": "2cc9780e-e552-4974-ae97-33ee79a23e37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5682",
                "uid": "3a870c65-ecc6-4314-85c0-c5c181091644"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5079",
                "uid": "f8e2b1ad-e87f-43ce-a7f0-6f56cc2c7743"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5165",
                "uid": "a23a9cdc-fe4b-49ed-9f59-8ea913afbcd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6301",
                "uid": "79d9938c-951e-4a7e-b971-0c9b4c164c2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6006",
                "uid": "8a046255-c7c3-4ccc-9fc7-a5e1f6f6be3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-lpsre-package-operator-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5736",
                "uid": "f6a560b9-ed68-488c-b829-f9a8fba49af5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:34Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5865",
                "uid": "ad65e8a1-3c8e-47e0-abc3-ca90d07a7bfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5344",
                "uid": "28321722-942a-44ac-abf8-b233d9f01cee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6463",
                "uid": "34cfff1b-02e6-42df-9d15-d43665e3be60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:45Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6081",
                "uid": "06fe34a1-33e0-4f99-8790-3e6b51aeeff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6098",
                "uid": "4ad2abd5-6519-43cf-b80e-915528128ad3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6533",
                "uid": "29b9663b-3a58-47e2-ab1c-64c378ba5347"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6540",
                "uid": "d4ecc722-c44d-4b41-ad3c-084d29a38225"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5379",
                "uid": "07eca9d2-792f-4ab4-b1da-65f95b865b2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:deployers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4212",
                "uid": "f93e4e52-ecc4-4a4e-a58f-57b97f99e637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-builders",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4223",
                "uid": "cc9695cc-75ed-4e9e-ad4f-4c8c64701066"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-pullers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4213",
                "uid": "21953150-dff9-4ed2-afa5-d6486c288db3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:12:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20257",
                "uid": "a3769d09-fdda-4bd7-8d5c-38155e07de82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:52Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19830",
                "uid": "b7e05e0e-22c7-4b71-b113-3313493b8096"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:50Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19697",
                "uid": "7b587cee-e082-4195-8536-e8c405c8d731"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19257",
                "uid": "0dcf5493-aa96-4d4e-beef-8a6dc00bae98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:12:00Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20078",
                "uid": "fa46c21e-8725-4e88-8930-048141ac43e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:56Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19900",
                "uid": "33229206-73dc-487f-aaaa-2bc0f5ff8913"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:12:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20161",
                "uid": "16c9c9c8-8696-4c99-9b59-3c6e669c9681"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19088",
                "uid": "fb522537-4a14-401d-a5f7-7d2297fd006f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:12:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20132",
                "uid": "085f17ed-227e-4267-8812-c7c7344ed243"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:12:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "20081",
                "uid": "ac1e14c9-454a-457e-ae60-d3417e3348b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19535",
                "uid": "e2d100e7-6014-4f61-9e17-9f43a911ef0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:45Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19527",
                "uid": "ae72670b-f28c-4763-ab77-e4644f4b93e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:52Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19808",
                "uid": "2f92a4cd-7d27-47b6-8158-142fa98ea7bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e691e3d2a30ff9528f1f4513358437dee134c0c03c9a8604ef14d0576881c254",
                    "operator.tekton.dev/preserve-rb-subject-namespace": "true"
                },
                "creationTimestamp": "2026-05-14T11:12:09Z",
                "name": "openshift-pipelines-prometheus-k8s-read-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-post-pgf85",
                        "uid": "4301d281-201c-4a16-8c39-d0861609659f"
                    }
                ],
                "resourceVersion": "20267",
                "uid": "2b8c2016-235e-4127-abea-64bfdd4a0723"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "22d0a8ff64fef6356b58c236a1efcdd6ff1a70b0c6df1d6569108d32855284e8"
                },
                "creationTimestamp": "2026-05-14T11:13:27Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-pcs45",
                        "uid": "8fdc736a-064b-44ee-a2d0-6d578ad0331a"
                    }
                ],
                "resourceVersion": "22436",
                "uid": "458de5e2-6f50-4f56-9b1e-8a9dbfdfb7e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "99d398a6620efbf1402cdfdc195a8b6aaba774aa12105dc8282cbdf6d6c7a8d7"
                },
                "creationTimestamp": "2026-05-14T11:13:27Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-pcs45",
                        "uid": "8fdc736a-064b-44ee-a2d0-6d578ad0331a"
                    }
                ],
                "resourceVersion": "22423",
                "uid": "74666b65-227f-4609-ba0b-e80b64a2db57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0b594d6df4e667c0b5eba94c37122de72a79fb9b89ea08f28ea38962bfc9e58e"
                },
                "creationTimestamp": "2026-05-14T11:13:28Z",
                "name": "pipelines-as-code-monitoring",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-pcs45",
                        "uid": "8fdc736a-064b-44ee-a2d0-6d578ad0331a"
                    }
                ],
                "resourceVersion": "22447",
                "uid": "e0b9a06d-8df2-44a1-bcfb-68c0994c863a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "cdcb87d7a1a304a39529a8330af1fe97468959177c80b6a604bd35d4b1d1522d"
                },
                "creationTimestamp": "2026-05-14T11:13:27Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-pcs45",
                        "uid": "8fdc736a-064b-44ee-a2d0-6d578ad0331a"
                    }
                ],
                "resourceVersion": "22438",
                "uid": "77f2e0e2-fd3b-4138-86d9-01542e071002"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "17d2ff8ee0736a5b1e1d0ca7548e9333f41c83bdd6f01f0136c88410e15290ed"
                },
                "creationTimestamp": "2026-05-14T11:13:27Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-pcs45",
                        "uid": "8fdc736a-064b-44ee-a2d0-6d578ad0331a"
                    }
                ],
                "resourceVersion": "22441",
                "uid": "d655d384-4e32-4d31-aeb6-cbb314d273ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:37Z",
                "name": "system:deployers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18783",
                "uid": "b1e949d3-1cea-45b5-919d-18d58372a69d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18781",
                "uid": "dc9a9bf4-4112-4e71-a0e7-7a9025a2f8be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18782",
                "uid": "e1dbe72e-2903-409e-88bb-5170fa50c21a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b893e360256724bcdd4e216223931b5596d37e35f92e190876bbfe01c7152812"
                },
                "creationTimestamp": "2026-05-14T11:12:32Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-q5bhx",
                        "uid": "91d25608-f1a1-4c37-8dcf-6ad13879c42e"
                    }
                ],
                "resourceVersion": "20814",
                "uid": "360015fe-8a6d-470d-95d6-9087359cca6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0ba427a25b82c183d69374884b41461a9d8722166de15294dc9841d4ff02b9f6"
                },
                "creationTimestamp": "2026-05-14T11:12:32Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-q5bhx",
                        "uid": "91d25608-f1a1-4c37-8dcf-6ad13879c42e"
                    }
                ],
                "resourceVersion": "20816",
                "uid": "c5fbf5b8-bf3b-41d1-b47d-78f2b3a0c6e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-konflux",
                    "meta.helm.sh/release-namespace": "konflux-ui"
                },
                "creationTimestamp": "2026-05-14T11:14:59Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm"
                },
                "name": "tekton-chains-public-key-viewer",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24446",
                "uid": "71146757-c433-4db6-a525-5a47a7166dce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b1e2d191aeb8e74c2ef612d1c165b229e02131b9b0964779b4467be5f320dd8a"
                },
                "creationTimestamp": "2026-05-14T11:13:15Z",
                "name": "tekton-default-openshift-pipelines-view",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-jmr85",
                        "uid": "a6b9cf19-0765-4cee-bb93-f675d5bada2a"
                    }
                ],
                "resourceVersion": "21840",
                "uid": "579ded34-008a-4953-848b-5b16412c330d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-default-openshift-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"82b1ea7dcfe761c8e2293565b5cd70772511a4467aed07ccd4074114e0cd533a\"},\"name\":\"tekton-ecosystem-stepaction-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolverstepactions-1.20-cbtts\",\"uid\":\"ae3077e2-8111-4bce-824b-75c904b516af\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-stepaction-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "82b1ea7dcfe761c8e2293565b5cd70772511a4467aed07ccd4074114e0cd533a"
                },
                "creationTimestamp": "2026-05-14T11:13:13Z",
                "name": "tekton-ecosystem-stepaction-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolverstepactions-1.20-cbtts",
                        "uid": "ae3077e2-8111-4bce-824b-75c904b516af"
                    }
                ],
                "resourceVersion": "21893",
                "uid": "7393deca-aab6-496b-bc61-408d50aa6135"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-stepaction-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"e5ead5e452158f0e87368880c62f2f0da55b400bfb93f7fde99765d4669316ca\"},\"name\":\"tekton-ecosystem-task-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolvertasks-1.20-mlqs8\",\"uid\":\"fe428cda-1363-4370-bfd7-d00d85344dc5\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-task-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "e5ead5e452158f0e87368880c62f2f0da55b400bfb93f7fde99765d4669316ca"
                },
                "creationTimestamp": "2026-05-14T11:13:12Z",
                "name": "tekton-ecosystem-task-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolvertasks-1.20-mlqs8",
                        "uid": "fe428cda-1363-4370-bfd7-d00d85344dc5"
                    }
                ],
                "resourceVersion": "21888",
                "uid": "ec17c209-34f3-4efb-82d4-d52a21ec44ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-task-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4ba50a47efee35e372d569c68357e516f45dc0f5dfe74f9990c81da61f6d9e11"
                },
                "creationTimestamp": "2026-05-14T11:11:50Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19688",
                "uid": "3105b5f5-c2c9-4ee7-8384-2386eae42ff4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2a1fd2b8dabc99adeafc31236ba442a43b37166b573f17f86db0029af92ab645"
                },
                "creationTimestamp": "2026-05-14T11:11:50Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19690",
                "uid": "5f56adc4-c2ce-415e-b028-c6505fbc9533"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2250ad661712887a3c9a6e61d4fc38ddf571110738c968e52790a8934439a482"
                },
                "creationTimestamp": "2026-05-14T11:11:49Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19678",
                "uid": "13a20f96-f74e-42f8-b631-3330fa159363"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "253c0a0ad69c5ab3467a8cc6cc0b5a96e0dc41c5075ac5a93d9a5ddb038080b0"
                },
                "creationTimestamp": "2026-05-14T11:11:49Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19682",
                "uid": "153e4dc3-abd6-4b69-8ebb-58a81e4e2792"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ccbf7745e40d654c3eda469e219f703e8d1275f2af514b482952f150b406f692"
                },
                "creationTimestamp": "2026-05-14T11:11:50Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19686",
                "uid": "b08180c9-13e1-4342-895b-b0ac430740e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ee76f724bf313f5e5fdb35affc2ae477ddb81a1869483ba03284f3566a9f57db"
                },
                "creationTimestamp": "2026-05-14T11:11:49Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19685",
                "uid": "e6bca3bf-8165-460b-8fdb-ee209cef25c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b826104fff38c4141f7d4812d79325725cbe77464060fcff25897ece8aeb767e"
                },
                "creationTimestamp": "2026-05-14T11:11:50Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19689",
                "uid": "bf446824-3db3-4392-95ae-91f4e1737458"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d03e69e3544c391173831f50b8f26a9537507185f9db6e56a33176bc55bee4a8"
                },
                "creationTimestamp": "2026-05-14T11:11:49Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19679",
                "uid": "9825c151-32d2-48ff-99d7-2ae969b64665"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a42338c1802d1ada3694749430a48d02430837154fffd18a99b9e6c2272af2aa"
                },
                "creationTimestamp": "2026-05-14T11:11:49Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-plkjs",
                        "uid": "087e5003-88f5-426a-930f-62a17c6a9b4d"
                    }
                ],
                "resourceVersion": "19683",
                "uid": "62ca8cdf-a99c-4793-8466-fb8a47d33df7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "bb4046722c89b58b3f26904ee25c480264431ad828bd10449c645332c936309a"
                },
                "creationTimestamp": "2026-05-14T11:12:58Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.16.0"
                },
                "name": "tekton-results-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-7k2s7",
                        "uid": "07e64e74-e52c-4273-8574-891a036785b7"
                    }
                ],
                "resourceVersion": "21370",
                "uid": "faabcbf4-fc3d-47e5-af8e-2fcd1297df5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c3805168e7045fd6a8c6d8ef14020baffe20e5d2df2383515ea2f3367c0b98c8"
                },
                "creationTimestamp": "2026-05-14T11:13:10Z",
                "name": "tekton-results-route-view-auth",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-post-vgx49",
                        "uid": "fff783c3-4929-43fb-8fcc-c67d86bc1ca6"
                    }
                ],
                "resourceVersion": "21598",
                "uid": "ce0eb1b0-e122-4246-97cc-9a93983e65bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-route-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3c6572d57d5aee09b88dbeea28633b8bac45b674dc491ac2d317ba6abb699596"
                },
                "creationTimestamp": "2026-05-14T11:12:12Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-9ql6w",
                        "uid": "14017000-5e62-46e9-a3a3-23ba310e4154"
                    }
                ],
                "resourceVersion": "20395",
                "uid": "baa9ca66-9c3b-488f-b930-443b74c336f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9c4199e30783d2143ad1a1c5bdeb9d47a21f98def1721e9f341ef9205ed88885"
                },
                "creationTimestamp": "2026-05-14T11:12:12Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-9ql6w",
                        "uid": "14017000-5e62-46e9-a3a3-23ba310e4154"
                    }
                ],
                "resourceVersion": "20398",
                "uid": "82e78a8f-5d97-411c-9baa-c5a78f946f4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "142224a12359323a29994454762f7a322561d6e00c822936e79f7af39f87342c"
                },
                "creationTimestamp": "2026-05-14T11:12:12Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-9ql6w",
                        "uid": "14017000-5e62-46e9-a3a3-23ba310e4154"
                    }
                ],
                "resourceVersion": "20393",
                "uid": "7a390387-c555-4bf2-9f6c-380cb319bc35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:26Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5688",
                "uid": "6593b0c8-e55c-4f49-884d-9df302712402"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5082",
                "uid": "0288f7d8-5589-4736-a29c-5663e9877a42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5194",
                "uid": "8a2ba64f-9e61-43dc-b9d0-1da76ce2c3e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6303",
                "uid": "de20d379-4e1f-487f-b0fd-bd8fb1321579"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6027",
                "uid": "88412235-783c-470d-a4e1-e3aee2a77661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5758",
                "uid": "dca0c464-1c49-402a-98f9-dbc0f556b1af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5595",
                "uid": "08f5b0cc-56d3-4efd-879f-a2c5527c6fef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:00Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6403",
                "uid": "7b3d1883-1fee-4ace-bbf3-fe3d6f6dc345"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:47Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6119",
                "uid": "7b0ed6a3-ee8e-493c-8041-ad53e79c1f5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6241",
                "uid": "4fc1bc81-241f-4c41-8dda-49a6e151743b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6496",
                "uid": "5e7eb864-06fe-42bd-81d3-013ad8d85ecf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6694",
                "uid": "cf144be3-a30a-4855-b1e9-a6d2c75d4d53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5193",
                "uid": "3c9c98eb-eb0f-4f2b-998e-9a47b28d9d1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:58:05Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "openshift-route-controllers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "1622",
                "uid": "4ed044e3-1773-4322-aa44-4175dcfcba83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-route-controllers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:deployers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4124",
                "uid": "1a397938-120f-4ec7-aba1-b029030a878c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-builders",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4138",
                "uid": "ea93dd6e-544e-4ee2-ad2c-205a4f6e522c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:40Z",
                "name": "system:image-pullers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4125",
                "uid": "b622a607-0efd-4755-8aaf-3f5221e2cc91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5841",
                "uid": "db7a1230-3af8-4f8a-a526-eb32faeb825e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4937",
                "uid": "eb7ec7ca-b82a-4bf2-99cc-cebeec61b08f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5101",
                "uid": "e33ec22b-cdd1-40ab-850b-1cbfe702e261"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6421",
                "uid": "d3a2c301-47f2-461f-9032-c69d28ff5cee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5960",
                "uid": "104e07eb-0258-448f-be5f-4b06fe74075c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5954",
                "uid": "477c759e-1f9d-4919-a073-710f9ff7ea09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5542",
                "uid": "dd3e604d-612e-42fb-b83a-a2f99d706649"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6419",
                "uid": "1b6ba35a-7cbd-4d65-9206-d68d1e97e15c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:40Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5989",
                "uid": "55cb7295-be06-4301-bf52-e6a852215f70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6057",
                "uid": "ba1472e6-5393-4a98-b420-1423e93d18fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6563",
                "uid": "f538a7b9-f6b5-4d15-b738-8d23ee4ebe1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6643",
                "uid": "18b9d35e-bec1-4f68-a00d-87af719547ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5182",
                "uid": "5d4d01b8-3465-4b7b-8262-c114f9541138"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:57:53Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "964",
                "uid": "bebba86b-fdba-4ad7-8177-ae7f6597b0c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4151",
                "uid": "9f23472a-96c6-481d-9112-7e859f0bc914"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4173",
                "uid": "00b62971-e21c-4da2-b1e9-365d4592599e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4152",
                "uid": "ab0a7947-1a94-4fa9-ab00-b2eb373dacbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:59Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11769",
                "uid": "ab7426ff-09dc-4867-9c8f-505d5933d2d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:39Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10925",
                "uid": "fe8b3339-c97d-4867-813d-c2e0e63549dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:51Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11431",
                "uid": "ffef9934-c8a5-499d-b4c9-25dd33055edd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:49Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11313",
                "uid": "f3220363-2ae6-41f1-8571-7abebf707335"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:01Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11807",
                "uid": "6ae3d772-b7fd-41fd-97aa-95d83e8e436f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10855",
                "uid": "7399823e-a441-4a5a-b037-0507422423c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:45Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11061",
                "uid": "65ffd383-d0d8-4811-8e0d-28da0eda2b64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10831",
                "uid": "67010245-7ec8-4043-8f39-e7ff4d3c25a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10679",
                "uid": "9ecdcc22-7f9f-474b-bbab-40b69c64f23d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11762",
                "uid": "aa3e9267-71a6-4a88-81db-5ae8003876b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:29Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10690",
                "uid": "ca98615c-f1a2-421f-9217-edb667fac988"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:38Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10916",
                "uid": "295b6fff-10a3-4724-b9da-3b7ba67d2e42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:47Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11067",
                "uid": "ef49b162-bb69-4aa3-8da5-c79d35520640"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:24Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10507",
                "uid": "1928a17a-125c-4acc-8485-ba6a2258af7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:24Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10506",
                "uid": "8fc3aec2-7a1c-4d95-9122-adbb07ab2f7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:06:24Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10505",
                "uid": "c87f006c-6603-42b7-b710-c3f5f8bca632"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:06:24Z",
                "name": "system:openshift:controller:service-ca",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10500",
                "uid": "fc4b1d08-65ef-470b-b457-ff7776e8ec6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:28Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5750",
                "uid": "0833a3cc-1041-4c49-b130-3d2c5e78464c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4999",
                "uid": "ba61e829-ecab-4728-b939-63d177a20def"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5074",
                "uid": "4722f196-c3f5-4259-9c3c-03f4534b0a26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6285",
                "uid": "45fbf6a0-b506-49e3-ac75-b1b56fb2c37d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:38Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5949",
                "uid": "cea25adf-b501-4583-8a49-72e58d470adc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:31Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5804",
                "uid": "db138b52-dd51-4b06-9816-8dccf735131b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5372",
                "uid": "4bcfbc20-0914-4273-aa73-2d32ae77b1c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:03Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6464",
                "uid": "bf8953f5-75ed-4591-a141-2affec82387d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:46Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6100",
                "uid": "c8797aae-f6af-4832-b3e8-02adfb138a4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6197",
                "uid": "55221c02-ee48-494b-b5fa-cf71f58d9697"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6520",
                "uid": "8f742b49-d2ea-4b70-87a8-398f24994134"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6488",
                "uid": "94482cd4-e09b-4f1f-bf08-8df7791970e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5363",
                "uid": "74b61857-c19a-44a8-b5da-9709064a0828"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:07Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-user-workload-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1758",
                "uid": "b033bf35-3467-4e4e-8bf3-cda6e24eb89e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "dedicated-admins-uwm-config-create",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6664",
                "uid": "8c5eea2a-5d12-4d3e-a2fb-f1dd6b7e7a78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-create-cm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "dedicated-admins-uwm-config-edit",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6660",
                "uid": "e30b716d-c323-4077-a993-368f8b27c031"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "user-workload-monitoring-config-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:13Z",
                "name": "dedicated-admins-uwm-managed-am-secret",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6670",
                "uid": "f0ab0e8e-5211-4bbe-ac7d-6946df7a83ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-manage-am-secret"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:07:04Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.5.0"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "12419",
                "uid": "2ce4b950-6e04-4a3d-94eb-bfa91b65380d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:deployers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4182",
                "uid": "ff6af49d-7163-40bb-85da-a1b82a8423f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-builders",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4184",
                "uid": "66d409b9-7c51-4247-a0fa-95472709819e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:41Z",
                "name": "system:image-pullers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4183",
                "uid": "2feb3c36-0d41-4938-9eca-b0560e1b2981"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:27Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift",
                "resourceVersion": "5730",
                "uid": "a2ace01b-f01f-4b10-aaaf-7798e7df7fd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift",
                "resourceVersion": "4941",
                "uid": "b5628a17-aeb8-4c6c-a919-fba82ce44ed0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift",
                "resourceVersion": "5166",
                "uid": "c5738cf3-2b8c-40e6-bd9c-a7a057306b90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift",
                "resourceVersion": "6369",
                "uid": "d14426ed-a747-4184-8a50-1034e3b3dac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:39Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift",
                "resourceVersion": "5969",
                "uid": "9de2b035-a581-49cf-b421-35306e481b0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift",
                "resourceVersion": "5935",
                "uid": "da7d41a8-79f3-49aa-a474-20ad160ff762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift",
                "resourceVersion": "5565",
                "uid": "043cc5d1-0d78-4bcd-ac65-dff039e066df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift",
                "resourceVersion": "6437",
                "uid": "fa643ab4-4aaa-494b-b816-d7d81c14afc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift",
                "resourceVersion": "6136",
                "uid": "4ea8b428-82a8-4a16-accd-c5228a974628"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift",
                "resourceVersion": "6061",
                "uid": "62886702-f29b-4722-a1a0-3aeae537b212"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift",
                "resourceVersion": "6487",
                "uid": "865b79e5-1566-43d7-91a2-28aecac3aaa7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:00:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift",
                "resourceVersion": "6524",
                "uid": "4e5fd307-d448-4ab6-8629-76dde67e8452"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T10:59:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift",
                "resourceVersion": "5285",
                "uid": "141490dd-4f8c-48bd-96ca-ea08decfb5d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:09Z",
                "name": "cluster-samples-operator-openshift-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "1897",
                "uid": "cd0e118b-b062-4277-b673-30c7dc67f074"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "OperatorLifecycleManager",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:58:11Z",
                "name": "copied-csv-viewers",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c41a8284-98d8-4d96-8727-7360ed1b45b3"
                    }
                ],
                "resourceVersion": "2112",
                "uid": "d5ae66a9-5b55-40cc-ad0c-9fab2df2a271"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "copied-csv-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19101",
                "uid": "7fa96919-69ae-4dc7-89a1-63a96f9e193f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4a61353a7792bea4a709ed9f43366a83ba32ea81a369a6b9e8c9d07750564ce7"
                },
                "creationTimestamp": "2026-05-14T11:13:46Z",
                "labels": {
                    "app.kubernetes.io/part-of": "pipelines-as-code"
                },
                "name": "pipelines-as-code-templates",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-post-pmnmr",
                        "uid": "55fe0828-95e7-4b7c-8db9-2ffd4f9543b2"
                    }
                ],
                "resourceVersion": "22812",
                "uid": "28e3aca2-5a06-4f25-9a0d-3f31476e916e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-templates"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19097",
                "uid": "ace0dd72-db10-4809-ae0e-b3d4df2db2c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-14T10:56:54Z",
                "name": "shared-resource-viewers",
                "namespace": "openshift",
                "resourceVersion": "476",
                "uid": "24d24175-4fad-4938-8d3e-34151c1c1864"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "shared-resource-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:deployers",
                "namespace": "openshift",
                "resourceVersion": "3240",
                "uid": "77803c17-2902-464c-896a-025c116188a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-builders",
                "namespace": "openshift",
                "resourceVersion": "3236",
                "uid": "81051c62-f73a-4571-aec5-a0927b1a843c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T10:58:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift",
                "resourceVersion": "3208",
                "uid": "e28019cd-5cc6-4b0e-a824-a3f4a6a8d1d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2358d3ba19234324fd2994866d0af874e97aebabcbd4f599bed0fe0a94d0e60e",
                    "operator.tekton.dev/preserve-namespace": "true"
                },
                "creationTimestamp": "2026-05-14T11:13:15Z",
                "name": "tekton-default-pipelines-view",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-jmr85",
                        "uid": "a6b9cf19-0765-4cee-bb93-f675d5bada2a"
                    }
                ],
                "resourceVersion": "21831",
                "uid": "9b89a795-ff0f-4530-a54e-89b3b81550b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-default-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "release-service",
                "resourceVersion": "25870",
                "uid": "a5851820-2bde-4824-a816-27f792b6c8b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "release-service",
                "resourceVersion": "25848",
                "uid": "0c75b220-e920-4b8c-917f-d844b874a127"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-0",
                "namespace": "release-service",
                "resourceVersion": "25299",
                "uid": "99d02099-5bcb-439a-adef-16b0e547145c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "release-service",
                "resourceVersion": "25208",
                "uid": "425471fa-5556-449d-9691-47f28fd8b055"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:07Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "release-service",
                "resourceVersion": "25817",
                "uid": "f81d1e95-0893-42e8-a214-0a6ce8cd642c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:03Z",
                "name": "openshift-pipelines-edit",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25429",
                "uid": "fdc447e6-48d3-41a6-8bb9-a3276b1888f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:03Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25417",
                "uid": "3dc66909-96f3-4917-90c8-55a04dee53d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "release",
                    "konflux.konflux-ci.dev/owner": "konflux-release-service"
                },
                "name": "release-service-leader-election-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxReleaseService",
                        "name": "konflux-release-service",
                        "uid": "332584b3-1e2d-43d5-9f98-0358bc1021ca"
                    }
                ],
                "resourceVersion": "25349",
                "uid": "7f15c796-7d04-4921-a5d3-a7ee53294ab5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:03Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "release",
                    "konflux.konflux-ci.dev/owner": "konflux-release-service"
                },
                "name": "releaseserviceconfigs-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxReleaseService",
                        "name": "konflux-release-service",
                        "uid": "332584b3-1e2d-43d5-9f98-0358bc1021ca"
                    }
                ],
                "resourceVersion": "25384",
                "uid": "cc9e5131-bf83-4a0e-91db-58da588fa8be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "releaseserviceconfig-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "name": "system:deployers",
                "namespace": "release-service",
                "resourceVersion": "24875",
                "uid": "3aa01bfa-cb29-4b42-8818-8731db75b95e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "name": "system:image-builders",
                "namespace": "release-service",
                "resourceVersion": "24829",
                "uid": "8d8dbee8-fa78-4285-b085-7624f66639a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:00Z",
                "name": "system:image-pullers",
                "namespace": "release-service",
                "resourceVersion": "24874",
                "uid": "e3bf0ffb-e125-447b-ba63-c2ea2dddb2d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "rhbk-operator",
                "resourceVersion": "14961",
                "uid": "d4189f67-5a20-4d70-a163-a67d28d7d9d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:51Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15401",
                "uid": "f055614e-aefe-4c92-b50e-88fa4b8dce27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "15295",
                "uid": "a223aa21-89ef-454c-8139-d92988085589"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15327",
                "uid": "fe242a63-519b-43a3-8dfb-c49bb56a5c4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:48Z",
                "name": "dedicated-admins-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "15294",
                "uid": "6e9fcf07-4bdb-4ad4-89bb-107ddac24247"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15361",
                "uid": "e0238c5a-f126-4c2a-bb57-060fc314b335"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19112",
                "uid": "f47069c4-1690-46ec-838c-f2cea95826b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19107",
                "uid": "5d334dd5-12a6-4b87-bf95-dca400466602"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:01Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.2",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "rhbk-operator",
                    "olm.permissions.hash": "36jW9QlaNsvzPJGRuCuNRcHk7hOZa26E3ofORt",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "09d72ee6-e91e-40e0-846c-05d8ae239c30"
                    }
                ],
                "resourceVersion": "17092",
                "uid": "e59244ec-62b9-41ad-a013-8a13747c3e74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:59Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhbk-operator.v26.4.11-opr.2",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "97fb94e9-9b8f-4704-9b2c-0515666f7ecc"
                    }
                ],
                "resourceVersion": "15646",
                "uid": "bfb81b14-d353-49a7-b123-cfdc725d7268"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-opr.2"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "rhbk-operator",
                "resourceVersion": "15123",
                "uid": "89d3fed9-534f-4563-9e13-824fd3f4b7b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "rhbk-operator",
                "resourceVersion": "15121",
                "uid": "8cabe4ba-2375-4c11-82bc-30bf0b080e66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "rhbk-operator",
                "resourceVersion": "15124",
                "uid": "389f218c-071d-444c-9a7a-0490ebbd1a38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14964",
                "uid": "6b13cb44-7a8b-4904-8b9f-710901fae8e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15377",
                "uid": "6bf2a3b3-57d8-464d-ac68-1b5847ffabe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15302",
                "uid": "ff4bcea7-82d2-44df-9c8d-091d2285eef1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15333",
                "uid": "6decae8a-8c3a-4e6b-84cd-914dbaef4f1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15296",
                "uid": "4ea27458-8800-4a88-bdf4-fd3af014f265"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15363",
                "uid": "00e9022f-94d9-4e99-8f37-cd5c17906670"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19134",
                "uid": "a957770a-9d7e-4016-aed8-9c20e06adbe5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19126",
                "uid": "7c1be7ba-2498-4ef3-b23e-228b387fbdb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15122",
                "uid": "0935e036-f54a-46de-91ef-4ad7b670fad4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15114",
                "uid": "268582e3-e6cd-4fdc-ae63-1c6f8e783414"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15112",
                "uid": "116d36f2-dfa2-4ff2-8447-61da2d164eb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "segment-bridge",
                "resourceVersion": "25849",
                "uid": "aac988d4-dfcf-47dd-9abb-81f35110c388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:09Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "segment-bridge",
                "resourceVersion": "25878",
                "uid": "7c968528-15fd-4344-a27a-796c6dd8a379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "dedicated-admins-0",
                "namespace": "segment-bridge",
                "resourceVersion": "25127",
                "uid": "9a9cd23d-dc77-4918-a086-6b32488a5e97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:02Z",
                "name": "dedicated-admins-1",
                "namespace": "segment-bridge",
                "resourceVersion": "25320",
                "uid": "166bbcee-80e1-4711-92c2-ddd95ebdc05a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:08Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "segment-bridge",
                "resourceVersion": "25842",
                "uid": "86df670e-2101-48da-92d9-8875ce18dcdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:05Z",
                "name": "openshift-pipelines-edit",
                "namespace": "segment-bridge",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25704",
                "uid": "d207469b-e181-45a0-8523-643146f6d1f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:15:05Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "segment-bridge",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "25700",
                "uid": "1ade816f-0d50-4ae0-89ce-40d344a9ff4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:deployers",
                "namespace": "segment-bridge",
                "resourceVersion": "25115",
                "uid": "a2ab2737-811e-4bfd-8edc-44969887d43d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-builders",
                "namespace": "segment-bridge",
                "resourceVersion": "25116",
                "uid": "d368140a-1ca9-4fd4-832b-c16245522837"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:15:01Z",
                "name": "system:image-pullers",
                "namespace": "segment-bridge",
                "resourceVersion": "25114",
                "uid": "50f233f0-15ab-4965-b284-c1d487376131"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18279",
                "uid": "433a99ff-53c6-4704-ae09-5849874701de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18270",
                "uid": "92fb8e10-f7d3-4fdf-9569-8786764488e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "dedicated-admins-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18293",
                "uid": "bc0f313f-70b3-4b4d-b774-3229eb7f5206"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "dedicated-admins-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18283",
                "uid": "b9cbbe10-b31a-4b4b-a143-68929bb289c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18300",
                "uid": "46c7e612-f38a-4e6b-83ac-6e81b47aac08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "openshift-pipelines-edit",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19151",
                "uid": "b33bb01a-76e8-45f6-a759-283c8a1ede68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:40Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19145",
                "uid": "cadd9af8-253d-4998-a0da-98a0a671e4cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "system:deployers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18281",
                "uid": "456d083f-ba65-4548-9bc4-3dad305b7dc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "system:image-builders",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18280",
                "uid": "a1ae486a-4be1-4f8e-af9a-37382e7866d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:11:29Z",
                "name": "system:image-pullers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18278",
                "uid": "e197524f-5682-451c-bebf-ef95d49a5651"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15029",
                "uid": "6d80f1eb-d62a-43f6-8d7f-0baefb7e0046"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15387",
                "uid": "7d6d9989-3421-4833-be0d-576edecd4951"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15305",
                "uid": "485c345a-c5aa-4be1-9094-af8399726be5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15339",
                "uid": "55c883c6-fa0c-4dd3-945e-de982d99ecbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15297",
                "uid": "31ae30bb-7ebc-42fe-9b78-bef8cf026944"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15338",
                "uid": "7f36c3c1-ef38-4dc8-aeb9-c589d787e019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19244",
                "uid": "18846c9d-2fe9-4bde-938e-e1e8caa26095"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19227",
                "uid": "a15234d0-4a7c-4add-9662-50c617dbb4dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:02Z",
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.2",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tsf-keycloak",
                    "olm.permissions.hash": "36jW9QlaNsvzPJGRuCuNRcHk7hOZa26E3ofORt"
                },
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "b101d1ec-7eca-4a37-b211-a421dbab6bf2"
                    }
                ],
                "resourceVersion": "15713",
                "uid": "4ffe547d-49c0-40c2-b712-fea638e2fa08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15125",
                "uid": "515d42a3-e3dc-478f-a80c-61736e9bcd18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15126",
                "uid": "ff4a1efb-3257-4a44-b441-281b88b73604"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "tsf-keycloak",
                "resourceVersion": "15128",
                "uid": "e0e9386a-6fc4-4261-83f2-860edb59a7d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "tsf-tas",
                "resourceVersion": "14960",
                "uid": "bb9b6cfb-0e14-4281-b16f-97e33d21de89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:13:19Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "ctlog",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "ctlog-createtree-job",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "CTlog",
                        "name": "trusted-artifact-signer",
                        "uid": "55d53a71-5d6f-4952-8d76-5ee28cf63381"
                    }
                ],
                "resourceVersion": "22057",
                "uid": "ca287814-dabe-4260-953f-724d3b8cdd58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ctlog-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ctlog-createtree-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-tas",
                "resourceVersion": "15392",
                "uid": "f727865f-ccc0-46a6-881c-8095e26f2494"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-tas",
                "resourceVersion": "15306",
                "uid": "a9a40b5a-93db-4ec5-84e1-781f551543ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-tas",
                "resourceVersion": "15362",
                "uid": "a3904c73-72ba-45af-b748-34a25218d927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-tas",
                "resourceVersion": "15307",
                "uid": "0b8df5c2-cd36-4ad3-9f77-80f66ccfd3fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-tas",
                "resourceVersion": "15370",
                "uid": "7c7d0f33-59cb-4270-8c61-8b1d5837add9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19271",
                "uid": "171498b1-1b86-42eb-a1ba-b7d4e1b7e556"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19260",
                "uid": "8a2c211a-7d46-42fc-b010-7a49bda10c49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:13:19Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "rekor",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rekor-createtree-job",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Rekor",
                        "name": "trusted-artifact-signer",
                        "uid": "92201cde-0503-4c68-bf94-09b34d62b71d"
                    }
                ],
                "resourceVersion": "22204",
                "uid": "64d11566-48ed-4e0c-89ea-9b570e0a641c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rekor-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rekor-createtree-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "tsf-tas",
                "resourceVersion": "15118",
                "uid": "835c7d03-d5c1-4946-9edb-2d14c777a533"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "tsf-tas",
                "resourceVersion": "15115",
                "uid": "bd69433f-1ed7-42e7-889d-b53216d98e2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "tsf-tas",
                "resourceVersion": "15113",
                "uid": "e99edb3c-f5b3-43d7-ad01-dbe3f4cf5131"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:13:18Z",
                "labels": {
                    "app.kubernetes.io/component": "trillian-logsigner",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "trillian-logsigner",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "trillian-logsigner",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Trillian",
                        "name": "trusted-artifact-signer",
                        "uid": "d182b66e-08c4-4395-b5eb-a3ac31f40d10"
                    }
                ],
                "resourceVersion": "22034",
                "uid": "47e84028-48b8-4ec2-b69c-f19a159a3667"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trillian-logsigner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trillian-logsigner",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:14:49Z",
                "labels": {
                    "app.kubernetes.io/component": "tuf",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "tuf-repository-init",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "tuf-repository-init",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Tuf",
                        "name": "trusted-artifact-signer",
                        "uid": "581a89ca-9c76-4ab6-9909-25791f21a12f"
                    }
                ],
                "resourceVersion": "24187",
                "uid": "d560e29c-4d6d-4e1f-9b19-39c546cbdeb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tuf-repository-init"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuf-repository-init",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:43Z",
                "name": "admin",
                "namespace": "tsf-tpa",
                "resourceVersion": "14963",
                "uid": "f396632f-0aa7-4bd6-ab13-dfde77941928"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "15374",
                "uid": "955f9143-9de4-435e-8528-ea53fe2e29de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-tpa",
                "resourceVersion": "15310",
                "uid": "797c6501-2c93-401a-8f69-bf17e3242616"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "15354",
                "uid": "0a1d9ac6-28f9-4371-bfba-5ea2ffe2f6ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:49Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-tpa",
                "resourceVersion": "15311",
                "uid": "f4008f69-ac8a-4798-973a-b976b26ba823"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "15353",
                "uid": "a23164b4-462c-461f-845b-bf659455a16c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19291",
                "uid": "99f512ae-3897-4235-9368-23650bb65d31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19282",
                "uid": "9fb34ed3-aa75-4324-85e3-641c772aefad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:56Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-get-ingress",
                "namespace": "tsf-tpa",
                "resourceVersion": "15551",
                "uid": "2f127e9f-f3ca-4cba-a1e2-77500a06fc84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "allow-get-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "placeholder"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:56Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-job",
                "namespace": "tsf-tpa",
                "resourceVersion": "15564",
                "uid": "614bc6f7-fbd7-4b70-8081-e784d83f333d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:56Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator.v1.1.4",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtpa-operator.v1.1.4",
                        "uid": "77d94527-f327-4b18-be62-c6d68388ac76"
                    }
                ],
                "resourceVersion": "15554",
                "uid": "9205a2a0-63c0-4d4e-809a-42948015a0b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:58Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tsf-tpa",
                    "olm.permissions.hash": "aFImzaN7XMTLc0qsAWHiSsv2PNOJPMjP0l04oA",
                    "operators.coreos.com/rhtpa-operator.tsf-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.4-rh-9EPBNtJmIseN8im3zaeTeU1HSeu9dzpBfcfFBN",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtpa-operator.v1.1.4",
                        "uid": "3a328f9d-04bb-4508-951e-88281c24b4f9"
                    }
                ],
                "resourceVersion": "16156",
                "uid": "544a1f28-5135-450b-b17e-97d6bc7df5cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.4-rh-9EPBNtJmIseN8im3zaeTeU1HSeu9dzpBfcfFBN"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:deployers",
                "namespace": "tsf-tpa",
                "resourceVersion": "15116",
                "uid": "008ff3f1-5040-488d-85b6-277fe5ed7227"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-builders",
                "namespace": "tsf-tpa",
                "resourceVersion": "15120",
                "uid": "e562991a-87d1-4f0b-b923-143ab4ad02fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:44Z",
                "name": "system:image-pullers",
                "namespace": "tsf-tpa",
                "resourceVersion": "15119",
                "uid": "3e86eb30-29ce-4dfb-90fd-247582da24c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf",
                "resourceVersion": "14899",
                "uid": "4405ff27-298c-4753-8207-1bdd5888bf43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf",
                "resourceVersion": "14892",
                "uid": "31ad61d3-c361-4874-9a34-92955f229e4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf",
                "resourceVersion": "14895",
                "uid": "6cfca707-7f1e-468a-9cb4-1d4b6a78c43f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf",
                "resourceVersion": "14898",
                "uid": "356b9769-099d-4df4-bfd9-77614746c315"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf",
                "resourceVersion": "14880",
                "uid": "0ac1a850-f87d-49c3-a2db-2f9cbe9d391c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19205",
                "uid": "381c8a85-350d-4f6e-ab31-ad231ea4e253"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-14T11:11:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-nbl65",
                        "uid": "0166ffc3-7a3b-45e4-aa2e-474b1b799117"
                    }
                ],
                "resourceVersion": "19175",
                "uid": "6e492885-c3c4-4ef7-ae15-a5ee40bb760e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "system:deployers",
                "namespace": "tsf",
                "resourceVersion": "14893",
                "uid": "a2bdac22-6811-42fe-a34c-8360a4328ce5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "system:image-builders",
                "namespace": "tsf",
                "resourceVersion": "14894",
                "uid": "4673ad62-36b7-415c-ba04-13bc7610d0bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-14T11:10:40Z",
                "name": "system:image-pullers",
                "namespace": "tsf",
                "resourceVersion": "14891",
                "uid": "8fd4b513-c20c-400a-999d-f18029a6e676"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
