{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "build-service",
                    "konflux.konflux-ci.dev/owner": "konflux-build-service"
                },
                "name": "build-pipeline-config-read-only-binding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxBuildService",
                        "name": "konflux-build-service",
                        "uid": "ece61e1c-1178-4401-baeb-81f641cb2b4c"
                    }
                ],
                "resourceVersion": "23745",
                "uid": "94973ad6-252a-4aca-94b1-de6acf15e0bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-build-pipeline-config-read-only"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service",
                    "konflux.konflux-ci.dev/component": "build-service",
                    "konflux.konflux-ci.dev/owner": "konflux-build-service"
                },
                "name": "build-service-leader-election-rolebinding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxBuildService",
                        "name": "konflux-build-service",
                        "uid": "ece61e1c-1178-4401-baeb-81f641cb2b4c"
                    }
                ],
                "resourceVersion": "23792",
                "uid": "7857712e-2c63-490e-a893-03c56960e803"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-service",
                "resourceVersion": "23299",
                "uid": "647e9815-162c-4d1c-8e40-3d0113056925"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-service",
                "resourceVersion": "23903",
                "uid": "facbe474-4f1a-4623-8f8f-a1b66354042e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "dedicated-admins-0",
                "namespace": "build-service",
                "resourceVersion": "23249",
                "uid": "04df29b2-d4ed-43fe-93ba-59a158c74c3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "build-service",
                "resourceVersion": "24131",
                "uid": "aa9b241c-5d78-4f36-ba4e-431086f4bef8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-service",
                "resourceVersion": "24002",
                "uid": "98c75281-8eed-4de0-8a93-a9feee76620c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "openshift-pipelines-edit",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24040",
                "uid": "f48f3141-50cb-47bd-9ad9-b0d640049ac8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "build-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "23977",
                "uid": "b2d37116-1faa-43b4-9367-93a1388ac1d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:deployers",
                "namespace": "build-service",
                "resourceVersion": "23369",
                "uid": "9b5c6f31-2830-4436-b59e-78e05bcfa70f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-builders",
                "namespace": "build-service",
                "resourceVersion": "23366",
                "uid": "ef7b1ab5-5db7-471d-bd17-fca7e185c54f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-pullers",
                "namespace": "build-service",
                "resourceVersion": "23362",
                "uid": "3156045c-22f1-470d-a274-a36dfc0b0c54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14298",
                "uid": "82869a24-cf1e-4b90-aae5-8ca035b0f8e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:30Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "cert-manager-operator.v1.18.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "cert-manager-operator",
                    "olm.permissions.hash": "4jYLDq1iyZV9YzfkRKnwl6m84wL1onr7Q78Kcm",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1-bRXkmVbFSatuWnHKY3y6UqKOvgDR0fvAP6PzmJ",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "cert-manager-operator.v1.18.1",
                        "uid": "20c11fc0-bb22-42be-b65b-539588e8fa18"
                    }
                ],
                "resourceVersion": "18428",
                "uid": "c19cd007-276d-43f6-a467-30798251dcbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1-bRXkmVbFSatuWnHKY3y6UqKOvgDR0fvAP6PzmJ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:27Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "cert-manager-operator.v1.18.1",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "cert-manager-operator.v1.18.1",
                        "uid": "22b47481-f850-42f0-a985-58a3e57f429f"
                    }
                ],
                "resourceVersion": "15582",
                "uid": "817909b1-ebcb-47e3-b7f9-4855f4777c8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1.18.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14681",
                "uid": "3e537259-f539-4be8-8662-c927cd3732ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14655",
                "uid": "92e2ab28-5960-47ab-abe2-be492f362d3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14648",
                "uid": "09fe5255-edd5-4157-9c18-7022dd079bbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14597",
                "uid": "6243d233-0e5e-4fef-82bb-9a3888a3b374"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14590",
                "uid": "3377d0c5-2384-448b-89fb-d4dd4197ed84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "openshift-pipelines-edit",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18070",
                "uid": "08114540-8b3b-47a6-8ee9-b846fd3b2b1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18067",
                "uid": "6b97db6d-5539-4be4-ac82-b6b8526912eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14440",
                "uid": "8ccdcac8-1bc0-47b2-9419-cded71146d55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14442",
                "uid": "f5fc39b4-7550-416c-aa91-6e8c021fb3d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "14425",
                "uid": "be3f7a43-b58c-4202-8d68-bc6df48815c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:59Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.18.4"
                },
                "name": "cert-manager-cert-manager-tokenrequest",
                "namespace": "cert-manager",
                "resourceVersion": "18565",
                "uid": "e741b0ff-9aca-4cd3-bdd5-354e946d8fe5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-tokenrequest"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:42Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.18.4"
                },
                "name": "cert-manager-webhook:dynamic-serving",
                "namespace": "cert-manager",
                "resourceVersion": "17259",
                "uid": "0041d24f-95f6-4990-a575-94fd874e5f59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-webhook:dynamic-serving"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager",
                "resourceVersion": "16363",
                "uid": "816ea6ed-4933-4c1b-99fa-f89d904bab05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager",
                "resourceVersion": "16310",
                "uid": "03c8915f-c9cc-489a-81fb-7224dff99a60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:36Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager",
                "resourceVersion": "16480",
                "uid": "c76c8285-c37f-4929-a718-c3dbd4dcc9f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager",
                "resourceVersion": "16338",
                "uid": "2c84764a-44e5-4264-a1c7-396084d54e4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager",
                "resourceVersion": "16352",
                "uid": "e8790a01-c163-4d8c-8ca5-861f388d6fb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "openshift-pipelines-edit",
                "namespace": "cert-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18060",
                "uid": "d6ca7ba3-603a-413f-bc9e-928f3c719b94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "cert-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18058",
                "uid": "afc55880-2cbe-4d47-b33d-539cb7240755"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "system:deployers",
                "namespace": "cert-manager",
                "resourceVersion": "16351",
                "uid": "947830fa-7337-4a28-9edd-e8c30500547e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "system:image-builders",
                "namespace": "cert-manager",
                "resourceVersion": "16353",
                "uid": "ae3579b4-4fde-46c7-b9e5-c5cb96c2dffe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:35Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager",
                "resourceVersion": "16350",
                "uid": "c803c04b-4f3f-4b77-9a4a-052416f33210"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6320",
                "uid": "824c1c8e-1b39-4690-a505-f6ff2aea5eca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6330",
                "uid": "8b496012-f815-4169-980e-7adf72517e59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6346",
                "uid": "cca56d5e-c16a-4c23-922d-83c3adc1940e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6348",
                "uid": "46250333-85ac-4c57-9334-ca57eaacf5db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:03Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6754",
                "uid": "047fcda3-36e1-41a9-b8ab-d5c1d5b8be56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "system:deployers",
                "namespace": "dedicated-admin",
                "resourceVersion": "6273",
                "uid": "d9068443-6f73-42ab-8dd6-1a7e7ff05f73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "system:image-builders",
                "namespace": "dedicated-admin",
                "resourceVersion": "6274",
                "uid": "d8f973f0-6485-4ff3-96ce-66213beecb5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "system:image-pullers",
                "namespace": "dedicated-admin",
                "resourceVersion": "6272",
                "uid": "bb7ebbe6-e8b0-4c2f-8be3-2c9c4276ee1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"authenticated-konflux-viewer\",\"namespace\":\"default-managed-tenant-syc5c\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"konflux-viewer-user-actions\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-04-15T23:02:34Z",
                "name": "authenticated-konflux-viewer",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25825",
                "uid": "c30de260-60d7-4ea8-9f9e-a25c7c57bec7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-viewer-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:35Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25849",
                "uid": "032c72f5-0116-4f15-a072-bc27e73a383b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:35Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25851",
                "uid": "d933791a-2339-4897-ab42-8bead8b706e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:33Z",
                "name": "dedicated-admins-0",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25798",
                "uid": "297b2c1d-1691-4d8f-a534-65fff4a3497e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:35Z",
                "name": "dedicated-admins-1",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25855",
                "uid": "199ca8b0-dc9e-4528-bcc0-8182437fcf17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:33Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25807",
                "uid": "f73e7bf5-ae14-4a0e-8c71-4183e16f55b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:34Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "25835",
                "uid": "078731c6-6c5e-4a24-898c-c5ce91ecda04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:02:34Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default-managed-tenant-syc5c",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "25831",
                "uid": "20d6c7ca-2a67-4013-9003-a47c44bbb3de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"release-pipeline-resource-role-binding\",\"namespace\":\"default-managed-tenant-syc5c\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"release-pipeline-resource-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"release-pipeline\",\"namespace\":\"default-managed-tenant-syc5c\"}]}\n"
                },
                "creationTimestamp": "2026-04-15T23:02:48Z",
                "name": "release-pipeline-resource-role-binding",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25969",
                "uid": "b08ca1f1-608d-4217-8b0e-080fc6557359"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-pipeline",
                    "namespace": "default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:02:33Z",
                "name": "system:deployers",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25812",
                "uid": "ddc3d666-3329-4cfe-a10d-43c041e7125d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:02:33Z",
                "name": "system:image-builders",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25813",
                "uid": "0d55ca9c-a1e8-4c1e-bfc5-bbdc492717d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:02:33Z",
                "name": "system:image-pullers",
                "namespace": "default-managed-tenant-syc5c",
                "resourceVersion": "25808",
                "uid": "99d7d474-8218-4779-8111-f907b1548584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default-managed-tenant-syc5c"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "default-tenant",
                    "konflux.konflux-ci.dev/owner": "konflux-default-tenant"
                },
                "name": "authenticated-konflux-maintainer",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxDefaultTenant",
                        "name": "konflux-default-tenant",
                        "uid": "9ce41098-5397-458f-b6c6-24e23e235ed8"
                    }
                ],
                "resourceVersion": "23618",
                "uid": "5ca50c7f-8f6a-407b-bdcc-0bfcd1f3fddb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-maintainer-user-actions"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "default-tenant",
                "resourceVersion": "23619",
                "uid": "68f5b7fc-55b3-4077-8f29-f9944d92b50d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "default-tenant",
                "resourceVersion": "24025",
                "uid": "911aaa35-d249-40ad-9721-f98cffb7532f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "dedicated-admins-0",
                "namespace": "default-tenant",
                "resourceVersion": "23678",
                "uid": "55d7e974-2e6d-4f1f-92e0-9010dcaefa71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "default-tenant",
                "resourceVersion": "24211",
                "uid": "e6acd33e-9844-482d-8214-5737b783f492"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "default-tenant",
                "resourceVersion": "23744",
                "uid": "c3ba72bb-fa93-4eb2-9037-1d71714f073b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "default-tenant",
                    "konflux.konflux-ci.dev/owner": "konflux-default-tenant"
                },
                "name": "konflux-integration-runner",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxDefaultTenant",
                        "name": "konflux-default-tenant",
                        "uid": "9ce41098-5397-458f-b6c6-24e23e235ed8"
                    }
                ],
                "resourceVersion": "23642",
                "uid": "18570d5f-5ca3-4b3a-bbe8-f9d77401332f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:15:23Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "default-tenant",
                "resourceVersion": "32776",
                "uid": "6ed6462f-0d6c-4371-8257-228fada9af85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-tsf-demo-comp",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24134",
                "uid": "17f1aa2f-df9c-4a16-93c1-17c731565cf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default-tenant",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24115",
                "uid": "62d26e98-4753-4fd4-b5f9-4ff38f42776b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:deployers",
                "namespace": "default-tenant",
                "resourceVersion": "23364",
                "uid": "6feaeb26-641a-4323-84d7-31e2d58fa7d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-builders",
                "namespace": "default-tenant",
                "resourceVersion": "23365",
                "uid": "8134cdb6-c0aa-428c-b68e-f56f0cc76963"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-pullers",
                "namespace": "default-tenant",
                "resourceVersion": "23371",
                "uid": "b13b2798-c4bc-4265-9022-9a3d8196d4cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "default",
                "resourceVersion": "6047",
                "uid": "c095e2f4-e9eb-4a86-a46d-f7e2cdf4dce1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "default",
                "resourceVersion": "4727",
                "uid": "55b0aa85-20ac-450e-be26-1be317db2e7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "default",
                "resourceVersion": "4827",
                "uid": "38f68a15-c918-4e06-86a1-ae5e027118bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "default",
                "resourceVersion": "5267",
                "uid": "9044922e-8170-42c5-a2f7-cdb604929a47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "default",
                "resourceVersion": "5067",
                "uid": "e60f20f0-b9ac-4907-9e66-9e48c1d013d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "default",
                "resourceVersion": "5763",
                "uid": "774540d8-2cca-4ec6-b4c2-d93f5cedecb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "default",
                "resourceVersion": "5012",
                "uid": "6a521f3e-3d9a-4765-ad19-a15a8fcdfd20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "default",
                "resourceVersion": "5442",
                "uid": "afa6a5a1-094c-44f7-b6dd-7069fe9484de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "default",
                "resourceVersion": "5407",
                "uid": "74b62e4b-f13e-4cb2-b47f-ac3d7ec0b5c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "default",
                "resourceVersion": "5740",
                "uid": "cd22a48b-8c80-4dc9-9f2f-7a0ad5e93940"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "default",
                "resourceVersion": "5999",
                "uid": "2be6a78a-01e3-44b0-ba1c-0baa7a39795c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "default",
                "resourceVersion": "6313",
                "uid": "627a0668-4460-436c-9b3b-39eab01a2caa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18078",
                "uid": "3861f84e-a4ee-4e52-9e24-52a2ffaba6d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18075",
                "uid": "956239d7-61b9-4f55-914a-667ea4ce44ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:13Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.7.3"
                },
                "name": "prometheus-k8s",
                "namespace": "default",
                "resourceVersion": "11077",
                "uid": "1fc83b0a-82d6-48ed-9aa3-1cd244c85eb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:deployers",
                "namespace": "default",
                "resourceVersion": "3240",
                "uid": "cd3b37e2-1b98-48dd-ae29-8ad89bbc663f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "default",
                "resourceVersion": "3280",
                "uid": "34847fbc-5492-4d55-8c84-ece172621a14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:image-pullers",
                "namespace": "default",
                "resourceVersion": "3239",
                "uid": "dcb67562-cd9a-40d0-8aa6-c50fe249b775"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24486",
                "uid": "5c5d15b3-579d-4dc7-afb0-5ff9352d6eb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23793",
                "uid": "fbe1641c-f8ae-4003-a174-6e63bc2517e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:43Z",
                "name": "dedicated-admins-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24482",
                "uid": "a68d4645-401f-4c4c-b75e-c06ea5c856ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24155",
                "uid": "862d2474-c353-47ab-8523-2e8b9dc4fba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23873",
                "uid": "0d1b7e6c-883d-4ead-8710-da2bbc9afec5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24336",
                "uid": "64b56257-1f5a-4b2d-8826-2651b5ad8372"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24323",
                "uid": "0687fed7-6d8f-4656-abb7-4a490dcb7ae5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "enterprise-contract",
                    "konflux.konflux-ci.dev/owner": "konflux-enterprise-contract"
                },
                "name": "public-ec-cm",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxEnterpriseContract",
                        "name": "konflux-enterprise-contract",
                        "uid": "511a43e9-bd08-4777-a994-9a89ba11a8fe"
                    }
                ],
                "resourceVersion": "23617",
                "uid": "1a8d3b70-b046-4157-bbf2-f50f73314417"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontract-configmap-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "enterprise-contract",
                    "konflux.konflux-ci.dev/owner": "konflux-enterprise-contract"
                },
                "name": "public-ecp",
                "namespace": "enterprise-contract-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxEnterpriseContract",
                        "name": "konflux-enterprise-contract",
                        "uid": "511a43e9-bd08-4777-a994-9a89ba11a8fe"
                    }
                ],
                "resourceVersion": "23644",
                "uid": "355db4ff-79d7-4294-8f21-e3a0a275899a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontractpolicy-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:deployers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24038",
                "uid": "ea98e2a7-715e-4748-819d-cdb7c1eae0c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-builders",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24014",
                "uid": "4fcce534-4556-4493-bbf1-6b37223495b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-pullers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "24036",
                "uid": "ad856126-d9a0-49f3-bbcd-1d0dcfcb05fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "image-controller",
                "resourceVersion": "23679",
                "uid": "66b69e79-98ae-473c-b0b4-712eb66d1729"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "image-controller",
                "resourceVersion": "23839",
                "uid": "17da3e6a-1b78-4ef8-bf47-fe53d4da8d7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "dedicated-admins-0",
                "namespace": "image-controller",
                "resourceVersion": "23300",
                "uid": "107e5abf-79ef-4df5-bcba-e5cb546e6694"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "image-controller",
                "resourceVersion": "24168",
                "uid": "129feef5-86b6-435e-9432-842ed9acb4e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "image-controller",
                "resourceVersion": "23904",
                "uid": "becaef29-b53c-4029-b061-e2eb36d1b519"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller",
                    "konflux.konflux-ci.dev/component": "image-controller",
                    "konflux.konflux-ci.dev/owner": "konflux-image-controller"
                },
                "name": "image-controller-leader-election-rolebinding",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxImageController",
                        "name": "konflux-image-controller",
                        "uid": "c54fa6e6-6d98-4f7a-baf0-2fc825125016"
                    }
                ],
                "resourceVersion": "23680",
                "uid": "208a1863-87ef-4ad3-9fba-5c3ecb878e61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24170",
                "uid": "5363ad13-c7cf-42ae-87cc-4863755ddf3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "image-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24158",
                "uid": "0ca61577-71c6-4274-96c6-587c70dfdf82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:deployers",
                "namespace": "image-controller",
                "resourceVersion": "23361",
                "uid": "01e65325-29f6-4b32-92e6-0da48dcb21bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-builders",
                "namespace": "image-controller",
                "resourceVersion": "23403",
                "uid": "338e5687-379d-4a2c-9660-3d420c96a573"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-pullers",
                "namespace": "image-controller",
                "resourceVersion": "23368",
                "uid": "d06d1676-1e4b-4bef-9d63-414c6dfcf93f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "integration-service",
                "resourceVersion": "23645",
                "uid": "8fb654af-0867-4f5e-be2e-4bcb4d5c4019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "integration-service",
                "resourceVersion": "23937",
                "uid": "578dc7e4-d499-427f-8f43-c8af7715cde3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "dedicated-admins-0",
                "namespace": "integration-service",
                "resourceVersion": "23620",
                "uid": "fc9d25ae-7fae-47b7-8ac1-b5cd335812f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "integration-service",
                "resourceVersion": "24218",
                "uid": "61ac8d6e-c1ce-4096-9171-1a5e839e8836"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "integration-service",
                "resourceVersion": "24024",
                "uid": "a8afb1f2-b172-4ab4-b57c-f3ad769a7343"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "integration",
                    "konflux.konflux-ci.dev/owner": "konflux-integration-service"
                },
                "name": "integration-service-leader-election-rolebinding",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxIntegrationService",
                        "name": "konflux-integration-service",
                        "uid": "e18e23a4-e017-4591-834a-e5764fc1a5f3"
                    }
                ],
                "resourceVersion": "23712",
                "uid": "98441640-a477-4c34-9907-66347913afa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24192",
                "uid": "79306f51-bacf-4b63-876c-3a0f3ece28cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "integration-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24182",
                "uid": "b1788828-b8f7-4464-87e3-682fae0e855d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:deployers",
                "namespace": "integration-service",
                "resourceVersion": "23370",
                "uid": "dd6eaca5-6e80-4f64-8eae-264338fb2e72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-builders",
                "namespace": "integration-service",
                "resourceVersion": "23367",
                "uid": "d2a9a1b1-c874-4d6a-9870-2c40ef25ae4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "name": "system:image-pullers",
                "namespace": "integration-service",
                "resourceVersion": "23332",
                "uid": "4fb81f75-28ce-4029-ad5a-018beec15320"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-info",
                "resourceVersion": "24493",
                "uid": "8ca1f8bd-f64f-4ca9-9278-381a14b86250"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-info",
                "resourceVersion": "23743",
                "uid": "2460c23d-71d1-482a-89fe-4afaa9149a85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-info",
                "resourceVersion": "24492",
                "uid": "a893baa1-2ff4-4a28-8140-bd2bd9d055e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-info",
                "resourceVersion": "24227",
                "uid": "4c87196b-c839-43fa-a095-86ab4ff91312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-info",
                "resourceVersion": "23791",
                "uid": "dc01bdb3-62cd-4da1-be04-31dbfe0f20d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "info",
                    "konflux.konflux-ci.dev/owner": "konflux-info"
                },
                "name": "konflux-public-info-view-rb",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxInfo",
                        "name": "konflux-info",
                        "uid": "837fee28-a021-4979-a1ae-75f7aeec52e6"
                    }
                ],
                "resourceVersion": "23790",
                "uid": "f787c22b-cd94-4fd4-99ed-2fb0957fbd47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-public-info-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:41Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24354",
                "uid": "d7d5660f-2f20-4827-ac15-64a3a8c78a95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-info",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24344",
                "uid": "14ffd2fa-a4ec-4359-8a20-c8c88c8078f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:deployers",
                "namespace": "konflux-info",
                "resourceVersion": "23994",
                "uid": "ad89ddf6-9451-4331-8023-6ed1ea6fdb57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-builders",
                "namespace": "konflux-info",
                "resourceVersion": "23995",
                "uid": "2c04bf8c-7e83-4ef3-a4a0-d71111c3e661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-pullers",
                "namespace": "konflux-info",
                "resourceVersion": "23993",
                "uid": "e7ad335b-9a7c-4bcf-9351-3f04e916c0cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "konflux-operator",
                "resourceVersion": "14365",
                "uid": "a1b32b1e-b3f8-42dd-8ab9-3c055c5d4b8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-operator",
                "resourceVersion": "14670",
                "uid": "49d13edf-d5e7-4781-b5b4-69e1dcf97891"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-operator",
                "resourceVersion": "14632",
                "uid": "94b91dee-f14d-4dcd-a1f0-45ee997a8d25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-operator",
                "resourceVersion": "14633",
                "uid": "2fe2bb30-4b26-4540-bb9c-394dcfd6703d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-operator",
                "resourceVersion": "14601",
                "uid": "8ff44b26-27bd-421f-b60a-577faa5999c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-operator",
                "resourceVersion": "14624",
                "uid": "c8f7e487-06cf-41eb-a394-ad3d757a17d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "konflux-operator.v0.1.9",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "konflux-operator.v0.1.9",
                        "uid": "b1d8708b-455f-4f67-b16a-12240bba3fdd"
                    }
                ],
                "resourceVersion": "14867",
                "uid": "3198d7f2-829f-4775-b4cd-e984d0b81760"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-operator.v0.1.9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:25Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "konflux-operator.v0.1.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "konflux-operator",
                    "olm.permissions.hash": "1Lf0o0poJTFFSECNbdN5yZ6xenveioNYgLgYj8",
                    "operators.coreos.com/konflux-operator.konflux-operator": ""
                },
                "name": "konflux-operator.v0.1.9--6f9Rvw3KWigeyXmFPUNOcijZ7P47NhDy45nupg",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "konflux-operator.v0.1.9",
                        "uid": "f6944bd0-ca38-40e9-9845-f2a01207fae7"
                    }
                ],
                "resourceVersion": "18883",
                "uid": "b28715b5-44b7-4ac0-bd85-9f530f5a9dbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-operator.v0.1.9--6f9Rvw3KWigeyXmFPUNOcijZ7P47NhDy45nupg"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-operator-controller-manager",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18087",
                "uid": "58e09fca-22be-4b1f-b677-52453ca42b4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18084",
                "uid": "1453aed2-7deb-4af2-ae5f-8224a6ad6a01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "konflux-operator",
                "resourceVersion": "14456",
                "uid": "2abd3cb1-0d3f-4ffa-ab5b-5cc39324c30d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "konflux-operator",
                "resourceVersion": "14449",
                "uid": "1fda2981-dbe2-46ea-814c-097b2ce5916e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "konflux-operator",
                "resourceVersion": "14448",
                "uid": "b3d04359-9380-4298-acdf-e0b70821cc06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "konflux-ui",
                "resourceVersion": "14364",
                "uid": "a551186f-b8b7-4282-b73a-baaec3542d1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-ui",
                "resourceVersion": "14672",
                "uid": "24dbaf62-8513-4fb1-b4dc-b317efb90d01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-ui",
                "resourceVersion": "14636",
                "uid": "092352d5-aead-490d-ac9c-ff71b1307b24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-ui",
                "resourceVersion": "14635",
                "uid": "1f2d64c2-ddc3-4f62-b98e-81c946335172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-ui",
                "resourceVersion": "14605",
                "uid": "e85d7873-49ab-4823-874d-89bcfd12bb6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-ui",
                "resourceVersion": "14594",
                "uid": "cf755a30-b558-49e8-a7be-80dd8447ef04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "konflux-ui",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18096",
                "uid": "ea1c610d-506e-45d2-b488-be2f9543e6a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "konflux-ui",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18092",
                "uid": "c145ffea-46d5-4e16-b563-4238852d1db1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "konflux-ui",
                "resourceVersion": "14436",
                "uid": "18562f2b-9e60-4dce-95eb-f137b23b0e6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "konflux-ui",
                "resourceVersion": "14447",
                "uid": "da669bd9-5c43-4015-bbe7-4d220b02223f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "konflux-ui",
                "resourceVersion": "14433",
                "uid": "8814ae10-5a7e-465c-b86b-547e8ceacc1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-konflux",
                    "meta.helm.sh/release-namespace": "konflux-ui"
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm",
                    "helmet.t.t.t.t.t.t.t.t.t.redhat-appstudio.github.com/post-deploy": "delete"
                },
                "name": "tsf-konflux-secret-rw",
                "namespace": "konflux-ui",
                "resourceVersion": "23295",
                "uid": "098ac64c-7e4f-4db6-a2b3-0101fd35244f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tsf-konflux-secret-rw"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tsf-konflux",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6172",
                "uid": "970c3a18-7110-43ac-9e1f-33d26c184fa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "4802",
                "uid": "e145ebcd-a786-473e-a14a-ebdbcb6f2ee9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "4796",
                "uid": "9f49f0e6-7654-4434-95d5-6489ed3ba3fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5144",
                "uid": "2c5db689-7289-43cd-9d38-32cbe6dc0c06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5084",
                "uid": "b0c72988-3128-47bc-90ea-84203ce03eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5747",
                "uid": "b6b256a8-2aa2-4eab-8deb-d40ac3712c46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5120",
                "uid": "b8b08524-bdf4-41cc-abb4-97cac6923c17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5468",
                "uid": "f480d6a1-adc1-4995-821d-e492cab31aca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5467",
                "uid": "61f99c24-f600-4861-9700-e6d967116685"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5777",
                "uid": "31c209f3-18ed-45e3-8e0b-2060e43de009"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5877",
                "uid": "f3f6ee71-401e-4a5e-b82d-d356dd0a9580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-tam-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6149",
                "uid": "ad9c5d48-9fc5-4c7d-a96a-3febfb2ae58c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "kube-node-lease",
                "resourceVersion": "3284",
                "uid": "b57c7905-b63c-49b1-9ff0-a71b23006ea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "kube-node-lease",
                "resourceVersion": "3285",
                "uid": "90f230fc-c165-4ce5-9487-36662fd08aa9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "kube-node-lease",
                "resourceVersion": "3281",
                "uid": "0b1de988-3ff8-48b6-b154-0a3b73874fbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "kube-public",
                "resourceVersion": "6135",
                "uid": "ef3a518b-120a-45cb-aac9-d2d6665cdc5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "kube-public",
                "resourceVersion": "4713",
                "uid": "a41705d4-c82c-4575-91bd-57c05b754ad0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "kube-public",
                "resourceVersion": "4717",
                "uid": "e98d555d-0bed-4d86-8616-99900120cd4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-public",
                "resourceVersion": "5283",
                "uid": "cee6dc75-362d-4c68-a0d9-34a34cee0439"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-public",
                "resourceVersion": "5192",
                "uid": "de1e5e70-e819-486d-8f54-9905f3513d87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-public",
                "resourceVersion": "5575",
                "uid": "84e1fd40-d266-4722-807e-6eec294fff21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-public",
                "resourceVersion": "5018",
                "uid": "ae1e2c79-8a45-4356-958e-9deb406f8cf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "kube-public",
                "resourceVersion": "5444",
                "uid": "a13227c1-4722-41a8-a2a4-a9df0e54e5a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "kube-public",
                "resourceVersion": "5451",
                "uid": "ac48efa7-54fb-40e3-9610-48c09415f984"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-public",
                "resourceVersion": "5741",
                "uid": "0b5aa48a-2f4e-4ac0-87ee-4c334f91aba2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-public",
                "resourceVersion": "5984",
                "uid": "bc90e520-b867-4b7a-a0dd-8577a8de72ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "kube-public",
                "resourceVersion": "6315",
                "uid": "26c42f47-daa3-4250-9eac-29b2456dc7de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:19Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "275",
                "uid": "696e78af-fac0-4646-8c73-ceefef07519f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:deployers",
                "namespace": "kube-public",
                "resourceVersion": "3199",
                "uid": "8fbd4051-d5e6-4e69-8b06-ad29b26dcd83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "kube-public",
                "resourceVersion": "3283",
                "uid": "f1ab60a3-c294-4fa9-9313-271f3db90d11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:image-pullers",
                "namespace": "kube-public",
                "resourceVersion": "3241",
                "uid": "83bf3428-279c-4467-81fb-f4efdcab5bed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "authentication-reader-for-authenticated-users",
                "namespace": "kube-system",
                "resourceVersion": "1478",
                "uid": "e5c75f26-4feb-4f97-9c81-bc62998b4f74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "kube-system",
                "resourceVersion": "6137",
                "uid": "4a5ef35f-234c-47b0-a84e-3cad5e407638"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "kube-system",
                "resourceVersion": "4776",
                "uid": "1d53a230-2136-4e9a-bda9-95539e483925"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "kube-system",
                "resourceVersion": "4788",
                "uid": "320f0b4c-4c06-40b8-8afa-da68c8fbda34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-system",
                "resourceVersion": "5185",
                "uid": "5b740469-7d3e-4583-a7b2-6bfa2df88df5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-system",
                "resourceVersion": "5038",
                "uid": "170bf358-94fb-46fb-8dc7-a1d69cc309c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-system",
                "resourceVersion": "5720",
                "uid": "7d58a655-80f1-4772-9ca7-2f4d9783e463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-system",
                "resourceVersion": "5122",
                "uid": "15463a21-47c5-4884-842c-54f524f6bc6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "kube-system",
                "resourceVersion": "5361",
                "uid": "4e684f3f-6251-4c03-8dcd-cae435f901a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "kube-system",
                "resourceVersion": "5345",
                "uid": "ac6bcd41-a54e-4e61-867f-589a10c7d127"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-system",
                "resourceVersion": "5791",
                "uid": "1694abd5-5503-4ac0-b01f-63ab03f018c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-system",
                "resourceVersion": "6004",
                "uid": "bb46e576-9515-42b1-b7f3-e1aabe8f79ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "kube-system",
                "resourceVersion": "6327",
                "uid": "5ef44781-ea96-4bfc-bc92-7213415b0f5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:43Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.18.4"
                },
                "name": "cert-manager-cainjector:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "17354",
                "uid": "8b127f59-3ed1-44b1-9934-be3ac6641303"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-cainjector:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:57Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.18.4"
                },
                "name": "cert-manager:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "18406",
                "uid": "4e77f8b9-1f27-45bc-8906-07614884b969"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:30Z",
                "name": "console",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2199",
                "uid": "4b16ae5e-2c57-4985-b2f4-7f0418a7492c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:30Z",
                "name": "console-operator",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2194",
                "uid": "71fb376a-08b9-4a85-97de-ddae7a5642f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:16Z",
                "name": "csi-snapshot-controller-operator-authentication-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1146",
                "uid": "6f3e4651-781a-4133-a077-cef7ef6e4366"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "labels": {
                    "app": "ecr-credential-refresh"
                },
                "name": "ecr-credential-refresh",
                "namespace": "kube-system",
                "resourceVersion": "5841",
                "uid": "80186439-e606-476a-bb2d-8d40ebc55431"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ecr-credential-refresh"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ecr-credential-refresh",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:08Z",
                "name": "insights-operator-auth",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "847",
                "uid": "363a3863-5e21-463f-9387-0a4c103d60b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:11Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server-auth-reader",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "10891",
                "uid": "b9b3863b-9d82-4a3c-ad2b-55617248ee7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:57Z",
                "name": "network-diagnostics",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "3008",
                "uid": "93823ec6-9b01-4331-a27f-dd28ba427f73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:13Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.7.3"
                },
                "name": "prometheus-k8s",
                "namespace": "kube-system",
                "resourceVersion": "11080",
                "uid": "2b9a2426-642b-4ec5-9610-3f5def02aa12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:17Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "269",
                "uid": "d897a916-b354-4c57-a09a-49e616363459"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:18Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "270",
                "uid": "838aa241-e72a-4870-a07a-221c01c79e1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:18Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "271",
                "uid": "733a6123-56c9-42b8-b5c1-5bab654acc2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:18Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "272",
                "uid": "a0492c7a-2f6a-4dad-9922-e831c1daf224"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:19Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "273",
                "uid": "1263e9e2-6fc9-49f9-9cda-1c495db6f160"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:19Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "274",
                "uid": "62b24068-1250-47ce-b95d-6fe3e8761443"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "kube-system",
                "resourceVersion": "3279",
                "uid": "1bdf960d-7d40-4042-b3f6-13cda1f315ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "kube-system",
                "resourceVersion": "3286",
                "uid": "44908ec9-9ed7-4da3-9ebd-26b0b3db3697"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "kube-system",
                "resourceVersion": "3278",
                "uid": "09a0fda4-4e78-4595-a0bf-72d355a0f340"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:leader-election-lock-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "1481",
                "uid": "940eee64-5a01-4f59-8056-15e5067e044d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:leader-election-lock-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "namespace-lister",
                "resourceVersion": "24516",
                "uid": "5377ad34-b439-4e3e-b68d-6c5381ef9108"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "namespace-lister",
                "resourceVersion": "23872",
                "uid": "7ff21880-87fe-47da-bfbc-d5d1561b1acf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admins-0",
                "namespace": "namespace-lister",
                "resourceVersion": "24510",
                "uid": "bcaae491-d11a-4c9b-81db-079e50cc32de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "namespace-lister",
                "resourceVersion": "24181",
                "uid": "db6cc847-c107-4839-b5bb-aa0009627b5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "namespace-lister",
                "resourceVersion": "23938",
                "uid": "6eeffaed-ab35-4597-ac37-74f48a278520"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:42Z",
                "name": "openshift-pipelines-edit",
                "namespace": "namespace-lister",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24372",
                "uid": "c5d448ca-ff6f-4bd7-aca8-db4322ef2864"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:41Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "namespace-lister",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24362",
                "uid": "71c6c9bb-9850-467f-a818-bb7033a30533"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:deployers",
                "namespace": "namespace-lister",
                "resourceVersion": "24016",
                "uid": "7f41dcb8-9388-452f-9ad6-eb94ef96e519"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-builders",
                "namespace": "namespace-lister",
                "resourceVersion": "24015",
                "uid": "8bfe3ac1-ca2a-42c3-848e-6ad251130a8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-pullers",
                "namespace": "namespace-lister",
                "resourceVersion": "24017",
                "uid": "05205d2e-1046-49d9-ba91-987e6dd56b47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:namespace-lister"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "6321",
                "uid": "38a30f9d-fa7b-4d0c-ba97-def173df3fa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "6333",
                "uid": "8abbf613-6db1-4521-9bae-2d41b0ea8dd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "6341",
                "uid": "4d35093d-9115-451b-9c00-f45bd68c3390"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "6349",
                "uid": "6b063ace-e236-43a7-9ead-7453d97d1b40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "6248",
                "uid": "fe2ddfcc-9d3f-4b96-8f11-f841b2766c9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18105",
                "uid": "5c5a3e4d-7e7e-4372-9b32-25e21c5015c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18101",
                "uid": "2183090d-818e-42f8-ac7f-0cb78f2d12b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "3282",
                "uid": "6b234db0-b62e-4ebe-a5d0-0fe6cf5869b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "3242",
                "uid": "a05321bc-56a0-4d1f-9650-23b39c619e21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9",
                "resourceVersion": "3200",
                "uid": "bea62561-154f-46cb-a250-bfe04dc1c37c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-2pms9aemt2thkcponu1tn82fanpjupm9"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6324",
                "uid": "b3589603-8ff1-4e01-9739-b7eeca9b70bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6335",
                "uid": "7c146c8b-9c30-4f40-809f-f3d2358722b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6344",
                "uid": "4b16abf4-b584-4d27-b5d7-43faeb4b4dfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6351",
                "uid": "e4b14ba8-1c7b-4561-b5e5-ce1b77865b16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6249",
                "uid": "16189ed6-5a8b-4dd8-acf8-55d8fea2e1ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3308",
                "uid": "9e82a105-bdd7-453e-a6e1-f73aee2e738d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3311",
                "uid": "457b19bf-6841-4ea1-a9b2-2919a2b35919"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3294",
                "uid": "7106a66e-175b-4757-85dc-16bb0fd3ca88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6139",
                "uid": "d9e65695-50b9-4a65-9c76-9a2467fdadcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4850",
                "uid": "2940a7a3-cb3d-4a50-82a7-4cd1ab959856"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4829",
                "uid": "4f605d73-20d8-43b6-ae36-2869d8475c10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5174",
                "uid": "0405c10a-116e-458b-9ecc-5dff53d5a36a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5100",
                "uid": "67ae050d-6876-46da-9700-3faf2af83ab0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5657",
                "uid": "f695011b-536c-41b3-8b2f-2bbea6a97904"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5061",
                "uid": "12286a52-c42d-49b3-bd3d-326e9c5e1c7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5390",
                "uid": "f5d2cfc2-e65c-4e75-91be-c9a851de56e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5381",
                "uid": "ea0c39f7-d26d-4228-be32-76f72e6ee1af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5770",
                "uid": "bba417dc-0680-4621-82cf-5cbc95f7a95c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5883",
                "uid": "c599903c-17e5-43df-a4ac-8fab9162804d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6345",
                "uid": "141622f7-54f9-4e06-b0a9-e65826144bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "719",
                "uid": "03d14320-6f09-4fb8-a4ef-4e56c0e7f38f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3309",
                "uid": "597bc425-3131-44f6-b71e-ceba0e285e64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3310",
                "uid": "bc2cc0e2-0951-4b06-8189-a0599af95462"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3340",
                "uid": "96f86964-d1c9-4b1c-b404-c645ade5a76c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6021",
                "uid": "0495584c-bfbb-4f14-925c-6a3c6d9cd5f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "4760",
                "uid": "53b1cffc-bbbb-496b-9874-e084c1a332bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "4692",
                "uid": "27d5ea1f-9c9a-4e97-bfc6-ac97b45178ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5131",
                "uid": "b82b792a-d7ac-4192-aa60-2311f90dd78f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5214",
                "uid": "a3123222-9cba-4943-87b9-5d353c779650"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5687",
                "uid": "03f7fb9a-3dc9-4dbb-ab2b-7f0513354745"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "4964",
                "uid": "d26b92e2-a88f-4280-88fe-39a93c0bd47f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5408",
                "uid": "0131ad92-6031-4750-bf6b-a1c10c801080"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5431",
                "uid": "a6c1876c-11f5-4a98-b9b1-eea377c7984e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5822",
                "uid": "d1c459fd-12f2-42fc-87a5-54f6d65bb5c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5843",
                "uid": "92cc9cf6-9d3d-4fc4-8652-d7c31e1d0468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6239",
                "uid": "75429b23-86c2-435e-9b4d-1bb6dd0a3b67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:22Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1586",
                "uid": "6574c32b-9604-4f4f-9d40-bc2e420465ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3322",
                "uid": "959bee45-463a-4d69-a7d5-c03468804728"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3313",
                "uid": "f718550c-2ded-4128-b785-b3df7c33f903"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3326",
                "uid": "c40ca67e-eee8-498c-b463-778d372fe0f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6151",
                "uid": "17a34d90-24b0-4f08-9806-36d28891f70e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "4830",
                "uid": "fb60c352-58d2-4f8b-81cc-8c8e8429cc4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "4705",
                "uid": "a3fc85e5-c501-4593-bd43-4b59eca7cd4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5188",
                "uid": "ae949f9a-7c68-4fa7-9334-d1d9ffc4601f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5087",
                "uid": "75c72f79-8255-4be1-89aa-346683b1e360"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5690",
                "uid": "f0430eb4-7d37-4053-bdce-1e450e13ebd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5037",
                "uid": "b06f0667-ee46-4421-b61c-19b20aab9a9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5343",
                "uid": "6bb79877-1acc-4ea0-817a-fcaee6b12736"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5382",
                "uid": "706cbee9-c9b6-4fe7-b121-f877948de2aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5721",
                "uid": "29666a9e-2273-4489-9f9c-b25cfd12b441"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5907",
                "uid": "35a90a64-c267-41cb-9deb-0e67f3a557e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6317",
                "uid": "daee60ef-bc6c-47c9-9861-b549fc74326b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:38Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2492",
                "uid": "7cedf6b9-ac78-4ddd-b41c-fda9fcaddef9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3345",
                "uid": "9eb7fe90-35c3-4f68-bd29-08175640d55a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3347",
                "uid": "6abe9bb8-bff8-449f-b1d0-ac3e6eea6933"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3325",
                "uid": "016e1ecc-ba56-4726-a788-da3f1c0293ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6026",
                "uid": "3206e719-c176-4635-89e8-259c9fcd177f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "4701",
                "uid": "b1218f2b-c8ee-4c04-9073-2038dbf617af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "4807",
                "uid": "083b91da-042c-45bd-a651-d943a5a3e9da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5161",
                "uid": "186662d8-c207-4b91-a4fa-9bc8d5dc0ccc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5128",
                "uid": "c7c62e02-5885-4f4c-b504-d40235df2f1a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5574",
                "uid": "36b3c2d8-2d5f-4345-bb2c-20d5a5b20aed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5031",
                "uid": "0e73eb12-42f6-4007-9576-1fe5421a0628"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5341",
                "uid": "4f6631df-0867-43f0-bb1b-9df338861744"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5438",
                "uid": "cf6c78e5-7ccb-492c-8889-b59e9349f66b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5673",
                "uid": "f753f7f1-7859-4398-a433-130aa2cc49c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6012",
                "uid": "abeb08a5-babe-4681-a788-0a2844429fc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6189",
                "uid": "0fd04eac-2895-4754-a0c1-9f1218739604"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:40Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2525",
                "uid": "37c33dc8-e924-4333-b700-632039729472"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3339",
                "uid": "f72fec9f-445f-4cd9-8edd-d1a5e4670e5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication",
                "resourceVersion": "3341",
                "uid": "f5d86072-800d-4bfa-9d87-605c508036dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3324",
                "uid": "a06a9377-b08b-4bd4-9502-535f4f62c3bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6152",
                "uid": "90b83a94-4af3-4b20-a267-b6736d15549a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6461",
                "uid": "781c759e-5bf8-4bf8-a268-12ff0b9427b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6466",
                "uid": "77dcebef-95f5-4cd8-9c37-32774404a082"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6605",
                "uid": "4d68b652-e333-422f-ae43-3d6b90232925"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6533",
                "uid": "87800788-dd72-4034-b8b8-4bf867b0b58c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5713",
                "uid": "2906636d-6891-49cd-b78e-bb0417e27bea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6518",
                "uid": "c53fce41-b205-408e-ad2e-bf3623a28006"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5364",
                "uid": "056fd3f4-6204-40ba-a5dc-e2d090c6e57f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5385",
                "uid": "bf0db8fc-48fd-4e0c-9cde-23af4d5d8feb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5712",
                "uid": "46383077-1c98-49d1-8596-f572b660c91b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5795",
                "uid": "6b67f169-9fc7-4b47-9fe2-5d4eb2c48da0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6241",
                "uid": "0a9fc7c3-2ac3-4601-8e50-b73ac64b0e46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5582",
                "uid": "2e4a60c9-e595-4e77-ad5a-0251168c4a2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5264",
                "uid": "4f4b6a82-41a9-4ead-bbac-0ca48e5eb3b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5266",
                "uid": "c48c1600-65a3-40a5-8355-6084903e367b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5265",
                "uid": "0187e9db-717d-42df-9139-2a455e5f3b9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6078",
                "uid": "8390b36b-b58d-4964-bb73-91055ce1d803"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6433",
                "uid": "ab397cde-b407-4167-9807-49ceb2d891d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:33Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6467",
                "uid": "c792df60-5af1-44c9-b094-48923c5ee26f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6589",
                "uid": "6eea1369-bff1-406f-b7cb-83dd0cd82e3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6545",
                "uid": "bffcf470-4a4e-4802-a8e6-e76e46a63835"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:54Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6700",
                "uid": "e79f339c-5666-4da4-a69a-5491ec563442"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6552",
                "uid": "824e6863-7e99-4cd9-9558-b49513444750"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6690",
                "uid": "45e7a4c0-32c2-4a35-81f8-c3fe75bd3e15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6571",
                "uid": "2fb603a6-2c60-43d6-9b0d-d8499e0f8b43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6713",
                "uid": "a502754d-81b1-40d8-871e-1910ca3a5d6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6719",
                "uid": "a69c4b2b-14c8-4767-a4aa-34b36310ca9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6319",
                "uid": "90e67a4a-7677-4474-b4d5-c0494be126a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6625",
                "uid": "0a2bb96e-226f-40fd-b80d-a16c7dd38277"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5969",
                "uid": "4c101151-51d1-4c3e-b2f4-1b2dced836f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5970",
                "uid": "7a058fd0-6bc4-4b32-9a3f-2e821c06e943"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5968",
                "uid": "c76916e3-4e86-467d-b7b7-f9588130eb70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6077",
                "uid": "9637b91d-536c-4ba8-8277-ad74d2b80582"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6435",
                "uid": "5a38f2c5-348c-411a-82d9-5a2537d1f032"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6437",
                "uid": "0afda210-d355-4376-b15f-0530547cd2e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6599",
                "uid": "afc7f7df-c4d0-4cc0-bd95-85e5e4d0cfe1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6542",
                "uid": "7e6dd31e-4dd3-4149-a63b-b25293b5ae3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5717",
                "uid": "16c47443-f320-4eb6-b80e-14e460f73038"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6539",
                "uid": "e0ddf59c-a420-4e65-9ae3-289d8b640020"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6643",
                "uid": "66476bb0-4d2b-4287-b61b-a94d5643ab0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6600",
                "uid": "e98d0844-221c-41e0-9c1d-710eaaf15721"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5733",
                "uid": "1054bc4e-614c-4dc1-a3fc-f13fa1c92e1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5808",
                "uid": "7e331956-c9d8-4159-b529-a8ec2d23424a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6311",
                "uid": "b9c13346-0ce2-496b-b9d4-af251343f6a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5584",
                "uid": "b7f5f113-fcab-4b5f-be33-3f88ac6563d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5570",
                "uid": "d0567a43-5037-4d34-b5d8-07afaa6e52d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5567",
                "uid": "5d5a138f-8dec-4c31-9b31-772b6072acb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5568",
                "uid": "cb1a895f-67a3-4167-a553-f84654305492"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6017",
                "uid": "57fd00b7-bd0a-48da-a9a9-42b40257ce88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6464",
                "uid": "814a8724-86a4-4f0e-b91f-a3d6d15dbaf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6449",
                "uid": "f85c63ca-feee-45a7-9437-2c6b733bf0bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5218",
                "uid": "e50a78fb-3bb6-4f91-a838-d526bcc10fb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5101",
                "uid": "624e9b49-daeb-4fda-a79c-f5f395a4459c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5744",
                "uid": "34e105ed-dadc-4377-9f91-7c553a21a8a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6554",
                "uid": "ce66d984-d374-4cf6-8aff-cea534f98ca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5366",
                "uid": "a8f9a78a-dde2-469a-8f30-a4f68c4ffb37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5419",
                "uid": "c5bf6555-5ef0-4882-a6cf-b6a2f2ddbe92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5736",
                "uid": "aaac5481-47cb-4d17-8922-c6022776dbdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6014",
                "uid": "d8b979d8-431b-4fdf-91e6-936b7fc720d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6160",
                "uid": "ea69a90e-bd47-4fef-8f40-550ccd3a3036"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5587",
                "uid": "5eb287f9-0058-436e-9cc8-798e90cedd5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4958",
                "uid": "1884bec2-2f31-4404-9f70-c61c0f79c482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4960",
                "uid": "ed6974b4-9458-4ece-94f9-a4a638297c0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "4959",
                "uid": "c85b86ce-5528-4de2-b939-dacc3486d431"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6049",
                "uid": "59a1e581-7fd5-44cd-93e6-d7d82c2305f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-cee-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6568",
                "uid": "7ecd05fd-0043-42fd-9925-4cc7d5eaf52e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:33Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6468",
                "uid": "696d1ce4-2b70-481a-bdd9-0863000aeca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6432",
                "uid": "d8e89cc3-5144-4b1f-8fbf-b1a321e81ff3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "backplane-csm-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6623",
                "uid": "a47a6d18-771b-4b15-85fb-ca448412e819"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6569",
                "uid": "0d98e1eb-52a4-4d0e-ae7f-58e7ae5cc284"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6566",
                "uid": "5734af4f-409f-42e5-84bf-9c68c0477311"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:54Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6696",
                "uid": "6715e901-c13a-4325-a84e-f2333175166c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:35Z",
                "name": "backplane-mcs-tier-two-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6497",
                "uid": "409928bc-fd10-4b8e-80fe-b93663e991ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6521",
                "uid": "fd06218c-2029-4256-91ca-7af4ad92f9e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-mobb-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6084",
                "uid": "720ccf2c-3fd6-464d-b4da-03ed466a6e1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6677",
                "uid": "c11da74d-d835-4903-a319-170b054b12bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:46Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6597",
                "uid": "c2d7ce91-3c9a-4305-8c37-d34bb07266a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:36Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6502",
                "uid": "0ec7d845-5b18-4507-9523-f28a7f38fc03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5802",
                "uid": "ea87a0cc-e6aa-41f8-9a3d-34b54fcfe758"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5909",
                "uid": "07024564-c6c9-468f-85cd-426ffe9b85ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6371",
                "uid": "b09a269a-9f4c-46dc-ac3d-5f6d77df1c1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-tam-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6120",
                "uid": "07826fa0-1a47-48bc-9b2d-be0efd5b6e0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "osd-delete-backplane-script-resources",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6131",
                "uid": "7aad4d05-1820-41ad-b512-f23d03f94624"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6628",
                "uid": "be273442-1d18-4488-8224-e2b172f6b2e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5656",
                "uid": "9a2e0e9d-4a99-4fc3-a49d-fc3cfd092cab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5658",
                "uid": "cb3144d1-7600-4b31-8f8e-42bbd8cd956c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5650",
                "uid": "630e7e19-b418-40e1-80f4-bbb4ecfa2938"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5998",
                "uid": "cab85fd3-38cd-4a23-8190-48c38e30a142"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6450",
                "uid": "1902958d-3e58-4b96-a1d8-8cdbe1c1327a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6485",
                "uid": "3ec01855-5223-4aad-8e7e-17c3333d8bb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5269",
                "uid": "f308f60d-759e-4f46-95dc-c3c2288bbbbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5076",
                "uid": "5027b6a4-8750-4372-90e0-b320424d2c80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5755",
                "uid": "ba3db407-dcf1-4c14-bc25-12022f5627c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5063",
                "uid": "228a9ddc-95a1-4e63-aef0-a36863019ae9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5446",
                "uid": "39f90906-08f0-492b-b505-fbc14d60cdaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5327",
                "uid": "6f709ea9-0707-4d57-852a-f2302737af76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5796",
                "uid": "5a705e34-28f3-4fcc-8f38-4d9b6b9b06ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6025",
                "uid": "37c72598-5b89-4656-93df-06b39bdd6b7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6188",
                "uid": "20ff5fbd-fed9-49b6-bb6a-7a4f167e7b57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5589",
                "uid": "a68288f9-776c-4098-a5ad-5352a07e966e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4874",
                "uid": "58ff337a-60c1-4353-903d-8ebae1023fe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4876",
                "uid": "8d1a691e-9258-48be-80a3-8dbd3677685f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "4872",
                "uid": "f89a681b-d948-40bd-8c7e-30768ff39319"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6751",
                "uid": "daffe76b-f125-4373-a477-5514e423fbe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6483",
                "uid": "70a396fe-fc7d-4cb4-b536-995fdf64a9c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6478",
                "uid": "08e90269-bba9-4bdd-a689-5e4be15e38b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6575",
                "uid": "d497863b-c7a7-4e65-bc73-4d9d6d32f4f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6556",
                "uid": "a9779ac2-9fef-419e-9331-2c53f03df16f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6701",
                "uid": "50d624d8-64c9-4cc9-a08b-8b9cd0d5b68f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6540",
                "uid": "e799d631-3299-4402-a8e2-d5cd9b98bc82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6636",
                "uid": "e0d40bea-20c8-41ab-93c8-18c3b048d561"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6594",
                "uid": "7bc1c996-42ef-48c9-9106-345ae34f723b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6706",
                "uid": "5174a967-f32d-428d-a252-bc8a83e6f20e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6750",
                "uid": "a7b9b96a-6306-44a8-86c5-008a524d8601"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6162",
                "uid": "7b993794-784d-4851-bc7c-3e066fad019d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6630",
                "uid": "5f965530-73b0-470b-b8af-7767b036e591"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6074",
                "uid": "cfbf34f6-a063-4edd-b6f6-a32f6899c76b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6071",
                "uid": "41b31812-e32d-4728-ad72-eb69ff23b079"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6070",
                "uid": "b63e9869-055f-4b14-b862-ecbe8974a429"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6744",
                "uid": "933cee75-24b9-4d18-93a1-c4fd0344e6e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6453",
                "uid": "82d78b26-7b34-4052-ba03-d5267e6966ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6441",
                "uid": "2baa39c2-b8f8-43df-bad5-2e7ca7e6c9f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6612",
                "uid": "572e47fd-ea15-4700-8209-522db7488974"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6546",
                "uid": "c5baa1d5-6874-4a03-9ad6-87bd0a709019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:52Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6680",
                "uid": "67fafb84-b267-480e-a4d9-4b3b93ba078f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6558",
                "uid": "f5673a29-4bbf-454d-bbb7-15e51858c215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6684",
                "uid": "7dbd7c17-aae7-4e4b-b14d-dbcaf1c078b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6573",
                "uid": "602e34f1-1999-4a1e-9e55-fe746c36bb04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6715",
                "uid": "8b7a0a8e-88d2-41af-b62d-66d6608643fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6725",
                "uid": "30692da2-b78a-4e40-8ae9-0ff0482b63fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:05Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6769",
                "uid": "1cc0f134-232c-47ac-9f17-54390d1bbf26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6632",
                "uid": "2583ada2-d042-426c-9169-647ec9bd90fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6398",
                "uid": "9e6370c8-2c3b-4293-8a00-6c28848372b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6399",
                "uid": "5bd86acd-b21f-49b8-afc1-6ba6e3963fed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6397",
                "uid": "19c2a60e-33b2-49ed-8f2f-ba3fdf661122"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6079",
                "uid": "3a5e80e0-3146-4d3e-aba6-9a26577e21c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6448",
                "uid": "ac5c8dd2-54c6-4ac7-9d90-beb232e92a8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:33Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6474",
                "uid": "36f1a64f-fc84-485b-8e82-2bc826b6488b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5221",
                "uid": "f49938df-1351-4c13-945d-79883e64805e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5135",
                "uid": "0049d565-a592-4ede-a334-cccc27e19776"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5618",
                "uid": "6954a923-b4f1-4e25-a6de-b1f3725ab806"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4929",
                "uid": "b628e32d-e3d3-4204-88b0-f7653d3d5a7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5448",
                "uid": "0e48cba7-8d01-49f9-8855-3bb30fffe4c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5357",
                "uid": "8c61aee2-2173-4138-adbd-53c09f7054c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5820",
                "uid": "574a0a58-35c7-4ac8-8387-ec86f8d26584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5988",
                "uid": "673df2e9-6426-493e-8593-45c22f26274c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6250",
                "uid": "074e911b-d57d-49e1-8e0f-61ed42f1fea4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5591",
                "uid": "fcf87d3c-1b5e-4b95-b774-085ef47f27df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4905",
                "uid": "18fa7f28-bdbd-4019-8d60-d2c6aab78611"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4906",
                "uid": "320596de-0cc5-4d0d-86ad-9d568f817a4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4903",
                "uid": "434b2f91-7156-4bdf-8179-20d9116cf139"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6757",
                "uid": "f604dbd1-006f-4b9b-b509-254d686d271f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:33Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6469",
                "uid": "317058a2-5f80-4502-8ad5-be66f4a7a979"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6481",
                "uid": "b670523f-a73f-44e4-a556-3aee03621661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6613",
                "uid": "b5a72f7f-543f-485f-a02b-1fec22e55d4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6549",
                "uid": "008a4190-5c13-4477-9432-20e23fddf14e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:53Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6683",
                "uid": "b52737fb-af26-4a2f-94c0-954d2c66db2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6526",
                "uid": "d79b099d-9066-436b-8814-1ea7c57eeb11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6650",
                "uid": "cc9868ab-4848-4f18-ae4a-4ee6e1a242f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6585",
                "uid": "b94a5b28-a835-4fe2-bb4e-741770cd4e35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6716",
                "uid": "498d35fc-3d72-4430-b6ed-082b02885cf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6732",
                "uid": "9d5c7f13-815a-4045-9615-5f4ec786b18f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6224",
                "uid": "4fcc43db-1e5a-4272-82b4-5145383db71d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:51Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6633",
                "uid": "88c2dd7f-0f7b-4a59-8c78-01e0344a9294"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6110",
                "uid": "eebfa9d0-24a1-42a3-a446-6169fee4d155"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6105",
                "uid": "631f95a3-6be5-41be-a1ac-c960b00c2ae9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6106",
                "uid": "4444d81d-7721-4e45-9c66-4e8231fa9706"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6005",
                "uid": "ac99a256-cd5c-4dd8-b93e-6116ddd83c4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6446",
                "uid": "5edb4626-1fa1-43ff-8fe9-1bb928aa0502"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6458",
                "uid": "82043bd6-6709-4263-b28c-7ba3fb78c68a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6598",
                "uid": "8dd49836-692a-4ad0-8373-3116750f0a4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6541",
                "uid": "b82902fa-396d-4f35-88c6-9378bda81b87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5743",
                "uid": "69e74288-97e1-4e5b-9ccc-4b904d7589ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6544",
                "uid": "a60405ac-0c3c-4648-a9f0-95ddde379eb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6634",
                "uid": "5dd27cb2-6383-4c7f-bd13-37ce3d7fb1d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6576",
                "uid": "c9e7c77d-b4bb-4c02-9ad6-f2bdb8e5b445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5729",
                "uid": "33b6c6ec-68b0-4022-b4d8-e2f76e6ed62f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5961",
                "uid": "1630217a-8629-436c-8889-91f5fe6773cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6283",
                "uid": "df172b32-cdd0-4a67-ad68-3fa5d974fbb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5532",
                "uid": "209119ac-17e5-448f-b52b-60b28145d9b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane",
                "resourceVersion": "5533",
                "uid": "8f6f6a15-dc2b-4ec7-bf4e-fecfe611ded8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5531",
                "uid": "7098cc74-62e1-422c-8130-e30d361c1898"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6007",
                "uid": "89abe425-d988-4735-bbf6-0a154a82e433"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4780",
                "uid": "81d8b32c-fdaf-4eab-bb62-476bcdc74f70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4744",
                "uid": "c7e27760-1803-4a34-b00f-92e147cdf71c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5277",
                "uid": "137829e7-4ef7-4de4-a2cb-cb8d98411d78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5054",
                "uid": "4789d3b5-9789-4590-b804-bd7be64d8ac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5706",
                "uid": "d1e88853-5514-4b3f-aae5-a79e289fd4ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4968",
                "uid": "7f5264ff-96d6-4491-b06a-773340b0e297"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5452",
                "uid": "e3b170ea-4965-4b0c-8153-b3eedb04b892"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5396",
                "uid": "f913de91-b890-4592-8f38-11ff7627872a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5773",
                "uid": "0c6852b0-487d-4feb-987f-2475fdc4f7d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6027",
                "uid": "f097e926-83a5-4101-88d2-50cf72bf1efc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6196",
                "uid": "744664b8-1a36-468c-af89-9b97fe866886"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3343",
                "uid": "c51f10d7-a174-4f9b-95e2-39e1ec8b430c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3348",
                "uid": "ec09a8d6-2078-4951-aaf3-580853aa8504"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3359",
                "uid": "dd234a40-4a40-43bc-91cc-048c5582b2ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6109",
                "uid": "442dc5fc-fd45-45b4-9567-653f3fc2b77b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "4693",
                "uid": "a70c31e6-4333-4ca3-96a0-6fa7a62ed516"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "4831",
                "uid": "d6890f8c-6357-44d8-8aa2-867d4aece69d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5272",
                "uid": "9fd24484-4b1f-410d-80db-e6c5c286e424"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5142",
                "uid": "2a8dc2e1-edf5-403a-9cbb-c3b627144fc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5588",
                "uid": "7f909756-b05d-445b-8d75-1bd977747fd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5106",
                "uid": "8f4eb5f3-0796-4813-8080-c057d1cbca29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5430",
                "uid": "3c77d625-339d-42c3-97da-b79bd5453816"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5349",
                "uid": "198fc9b4-3dec-4147-a52b-faa09fe84bec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5689",
                "uid": "a8609e02-0969-4388-8075-647b45c0fc04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5845",
                "uid": "fc67c2af-8948-43a2-936b-5639f2ad8fef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6238",
                "uid": "90a32c39-b28b-4f81-bf4c-821df337534e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:14Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1084",
                "uid": "938e42b1-1ea2-454f-a1be-92bc5500076b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "716",
                "uid": "8f9e99d9-cda2-41c2-a47e-5470b933fa35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3349",
                "uid": "3f870147-ec59-43c9-93b3-42024b293525"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3346",
                "uid": "5c9ddd7f-9b29-4e2d-9867-183c6bab776b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3363",
                "uid": "d5d706ab-883e-43a4-afd6-bde1c72e16b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6154",
                "uid": "ea84c485-162d-4bf3-9f10-551b1adc4643"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "4823",
                "uid": "8b2101eb-d8b1-419d-af42-bd7eb148f1c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "4777",
                "uid": "fe7e5521-a497-4167-9154-1811cdc12a6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5204",
                "uid": "b175b7c0-fbfb-48c6-bf56-1ef613664b50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5057",
                "uid": "e3cfe77d-8e92-448b-bd72-973ee98d3cee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5626",
                "uid": "637a7937-8e01-4771-8234-f7596da34cef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5109",
                "uid": "d8182d28-65d5-47f5-8a24-6a24b5a9cdbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5402",
                "uid": "b0b1c5c2-5c91-47ea-83a5-ee22a6bf1004"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5387",
                "uid": "10d0cdd8-b16a-4b00-9d9a-8646d4216557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5675",
                "uid": "6fded821-11ba-4e51-b133-d6151852e945"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5812",
                "uid": "7cdde063-0fc6-4001-8aee-5ca706467e39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6329",
                "uid": "7490a4bb-7b9a-4ecd-818c-0735cf661773"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:40Z",
                "name": "cloud-network-config-controller-rb",
                "namespace": "openshift-cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2549",
                "uid": "8b40bf9a-e5bb-4cdf-8922-acef14428270"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3362",
                "uid": "724cb41c-e897-46a3-a3a8-e8e8818f7c29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3342",
                "uid": "b74be0ae-40a0-46ab-9145-0c5a4de4ec76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3358",
                "uid": "0b5fd932-8df5-4642-9c18-c96e4ca280f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:26Z",
                "name": "aws-ebs-csi-driver-lease-leader-election",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1888",
                "uid": "085edb95-35ee-4613-916e-e9d1a2583883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-lease-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "name": "aws-ebs-csi-driver-operator-rolebinding",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1477",
                "uid": "22557aef-ece1-4921-9f14-8341a865ed89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:25Z",
                "name": "aws-ebs-csi-driver-prometheus",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1799",
                "uid": "7ae4cb2b-03ad-4bd8-8ba8-dfb22b682a97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6126",
                "uid": "a0fe2109-6b7b-40f7-a111-a17ec1c1f463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "4789",
                "uid": "4464eb46-3086-4da3-9776-3d12b56afa6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "4708",
                "uid": "6ce68549-231f-414e-84b1-1db70751a7c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5193",
                "uid": "08074037-20c8-4a1a-88b4-1ca7af44552a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5104",
                "uid": "4820cfea-c0be-4362-b775-c413c6da50cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5576",
                "uid": "f81a87cd-2912-41d3-9df8-fb13b016fda0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5083",
                "uid": "eea20fbb-96ad-4395-89d1-3278ed049baf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5393",
                "uid": "d22dbe96-1c20-437d-9f25-17732ac51b7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5333",
                "uid": "8deceb75-42d8-49bc-ac4e-bf629e4033cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5778",
                "uid": "774fc163-3dfe-4e35-884b-17e028a0bb23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5921",
                "uid": "c3a0d871-6c36-4980-aaed-4e11ba67fe17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6164",
                "uid": "6519984e-fe59-48bd-bf18-b5f1eea51c4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3375",
                "uid": "242f6065-a20e-4358-af81-b3cadd8b70ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3380",
                "uid": "2f6d6127-0c80-43f4-990e-728d608d2f79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3361",
                "uid": "3d156cfe-6fe7-45c8-9759-002c486edda8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6113",
                "uid": "d4f80ad6-cc00-4f0c-aeed-2b97669db7eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "4768",
                "uid": "9cb72bd3-a51a-4cce-a297-a8ff6215f859"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "4696",
                "uid": "c99563b8-bed0-43e4-ada9-b3bd6049a23f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5194",
                "uid": "cea8ef24-f4f7-4623-9faa-2c306656275f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5130",
                "uid": "69869dae-958c-4a0d-ba4d-a989b1816f1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5619",
                "uid": "3c1a8a39-ad85-40d7-9f25-cc3af844ffb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "4915",
                "uid": "167f81a7-4cbc-4e9f-a181-e683fc5ec8ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5432",
                "uid": "81cc1fbc-a578-4fa0-8582-2fe8d71a212c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5453",
                "uid": "ccdf964d-bb24-4ba3-bc68-690bf33f3fc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5805",
                "uid": "158bd196-db1e-4698-bd78-19ed1273ccac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5775",
                "uid": "27f119d0-9b80-4f36-8e1c-7f4ec45158d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6175",
                "uid": "10af698b-c70c-4e70-8e47-2a2874400673"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:08Z",
                "name": "machine-approver",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "887",
                "uid": "83eb52f8-dbf3-4f1e-8f42-1c86cf215bb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "833",
                "uid": "8b999129-46f5-47d7-b607-646951536a7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3374",
                "uid": "8561f327-2c5b-4c20-b4b7-e3a8ce0faea1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3378",
                "uid": "a731a6ca-f112-4ad0-aec7-e656cc01feca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3373",
                "uid": "d2ef8fb2-5665-487d-aa10-39d55ae49e62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6114",
                "uid": "4efa2b38-6a82-4684-867a-272a9fd0a927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4704",
                "uid": "5ff3f442-88b1-4307-b618-e66e6dc473e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4835",
                "uid": "29a08af7-4b98-48c6-833a-ac3f103efb6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5299",
                "uid": "e9c947b3-c0d8-4aa7-b893-bd22814b915c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5137",
                "uid": "d4e059c2-bc85-4ca1-908f-0992a143bc2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5578",
                "uid": "9d38cf36-d5df-4a8d-86f1-e3da16e61377"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4916",
                "uid": "c3265ad3-5675-431e-867c-930f81424e48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5386",
                "uid": "10ddbed5-e914-47df-b727-458b7ec53e94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5329",
                "uid": "68b28353-6ee2-4a7f-85d0-72effa0fb580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5754",
                "uid": "18d48ebd-b3a3-4b4a-94d6-44c12aac2495"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5849",
                "uid": "3220b8b6-f574-4128-bba4-70a065c946e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6302",
                "uid": "b3725a9f-9bd9-459c-a74c-430dcabd9d71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:13Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1056",
                "uid": "bd75cd18-dcad-43a4-b486-4a4cd76960eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3376",
                "uid": "140b8a8c-4707-428e-ad14-c4d9554ca9d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3377",
                "uid": "e9647142-0d82-4a6e-a2b3-be0eb4f7779a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3391",
                "uid": "5c387bea-a80a-4d44-8bc2-13352cf9c06d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5983",
                "uid": "9271b414-c91f-4c3d-92d8-7dbe8d5810bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "4746",
                "uid": "fbf0ca06-4277-473a-8932-ef929708d5af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "4762",
                "uid": "e766641c-b49a-4023-adf5-1179ca04a77c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5163",
                "uid": "fd45059d-f88d-4fe2-a9e0-5aa13d7c1895"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5116",
                "uid": "b42f5121-8ae1-4a15-b6cf-ac803e6f6836"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5590",
                "uid": "dedbc45c-738d-4376-9dbf-68b3d8d2956c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5112",
                "uid": "f44e1b49-c905-4627-8a34-e7aad369ddbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5410",
                "uid": "3f706dc0-9a8a-42c2-8c7c-4334a396611d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5398",
                "uid": "902e94ed-cfee-4f95-84e8-57bc60a2a60b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5799",
                "uid": "444c0a1d-61de-45db-85e6-6cdc07e6e8ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5933",
                "uid": "82e25faf-e0f4-439f-b8c9-a15cfe1fae35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6153",
                "uid": "09dd928e-137f-4bb9-977e-a327d156af5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:25Z",
                "name": "cluster-samples-operator",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1809",
                "uid": "95ff88e9-676b-4484-a91a-052ae1fb6414"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:51:47Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "12551",
                "uid": "6c18604b-a57d-42d7-b0df-d617b5fafbc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3379",
                "uid": "69c6d4bd-7ad4-403b-87fc-1f904dafaa4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3390",
                "uid": "00ef1319-cda3-48e9-853e-ac93f63fd469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3392",
                "uid": "4168f6b6-02f9-4d82-8116-ee0604857fd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6033",
                "uid": "2e92f964-5dab-48c4-9eb4-5be856607b21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4714",
                "uid": "3ee51b60-0dcf-491f-b0fc-fd27def70ec4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4698",
                "uid": "78554fd1-03d2-4565-8e2c-aed03915d514"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5241",
                "uid": "8523b466-981c-42c5-a2c8-9c716689edcb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5046",
                "uid": "b7b09442-6d6e-4151-8e4e-0c5c2a2a7176"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5725",
                "uid": "fed304c5-075a-4059-b81b-c429da89299b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4953",
                "uid": "04a3430b-6538-4ae7-9104-0f73abc96b4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5395",
                "uid": "7fb3c3a7-6ab6-4856-bcfa-11b72cc2ff90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5350",
                "uid": "87d2c30e-85c7-4787-9d49-dfa1aa982f98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5678",
                "uid": "73ec8c83-6d1e-4cd6-8a28-4835710a49b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5779",
                "uid": "1bb87a67-1980-4aca-8210-1560040e980a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6310",
                "uid": "e57cd12e-7c96-4354-bdd1-b8077426c13c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:15Z",
                "name": "csi-snapshot-controller-leaderelection",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1111",
                "uid": "5ead56c2-436d-4c03-8a62-83f1147fb582"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:24Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-role",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1695",
                "uid": "9fd7c7f8-0572-4c26-b6ac-c8cedc463c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:05Z",
                "name": "prometheus",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "720",
                "uid": "b3ef666d-6d52-4e2e-8163-b9ffa9e76fab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3403",
                "uid": "ce3f590a-787d-49c2-905d-30f65e95e0b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3415",
                "uid": "e8ec4224-bdfd-4bec-8ca6-6f4ec717a35a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3402",
                "uid": "8fc79bc5-ea84-4a27-a592-4126d3bf08f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6116",
                "uid": "3f454a83-0ab5-4d87-92f2-37561a194209"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4805",
                "uid": "3d585d60-87d7-479d-9bb6-94308537dc57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4719",
                "uid": "0a966dde-9507-4a94-b7a8-821bc4d4a0b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5309",
                "uid": "f36c6717-2bcf-4ef8-b39e-ae4f9171ab47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5164",
                "uid": "0bf719fa-d98b-44fa-b346-35a41eaf27d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5666",
                "uid": "fc685abd-558c-47b6-8f65-0c6292c514c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4969",
                "uid": "d4997a35-b5f5-4585-8693-b613c6d2dbc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5334",
                "uid": "ff5ad063-26b1-4532-81d5-5aa32f23e641"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5455",
                "uid": "245b5a4c-2a6b-4e85-aa48-d6fa8ad88668"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5680",
                "uid": "f89855c1-b437-42e5-bf9d-defedad06fb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5817",
                "uid": "f9ff1832-0f46-4504-8f2b-44d2f8442eec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6179",
                "uid": "6e7da9a5-3072-4939-a355-b56e664fe917"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "exclude.release.openshift.io/internal-openshift-hosted": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"exclude.release.openshift.io/internal-openshift-hosted\":\"true\",\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant Prometheus access to monitor the cluster-version operator's metrics.\"},\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-cluster-version\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"prometheus-k8s\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n",
                    "kubernetes.io/description": "Grant Prometheus access to monitor the cluster-version operator's metrics."
                },
                "creationTimestamp": "2026-04-15T22:43:57Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "500",
                "uid": "5f027fcf-d63b-4035-ac4b-ba9de4d7bba5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3414",
                "uid": "58ac5ab2-89f1-4ff3-b402-78a5d320d172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3427",
                "uid": "74abf2a2-ff9e-4cf2-93f0-2eaf810c630c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3426",
                "uid": "e0f09ccb-3603-4b5c-80e4-b50f0c259ad3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6130",
                "uid": "67e48449-b611-4272-995f-cf0ca91893a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4834",
                "uid": "558e386e-bf9e-474d-b29e-86f94340a8ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4700",
                "uid": "ce2d082c-b890-4412-af9a-f6698e84cdde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5152",
                "uid": "1349a2f2-e719-4cf5-bc6f-e66f54f8b3fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5105",
                "uid": "47d1c968-68ac-487b-b728-3db3a056f851"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5668",
                "uid": "382fb844-2e94-4d43-b310-7050ff163a19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4935",
                "uid": "068011ca-22cf-4459-bf03-b9c3ada4b68e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5433",
                "uid": "668ed08c-ce93-44d7-973d-8833f3156259"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5363",
                "uid": "77014f8b-90ad-4577-91bb-8c9b5da37423"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5825",
                "uid": "b0147807-ebf8-4d11-8da7-cb8a4eee6c09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5914",
                "uid": "8e474d9f-07ad-44ff-8965-86f140d6a635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6332",
                "uid": "bff33876-5136-401b-8fa3-b2dffd865a70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:10Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "960",
                "uid": "2144e526-73cd-4ecd-b14a-a071414c00ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:30Z",
                "name": "console-configmap-reader",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2195",
                "uid": "4da6b63a-9249-4469-a72d-cdc44c4f1c6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-configmap-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:29Z",
                "name": "console-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2187",
                "uid": "471db916-a483-4750-a889-fa9dc068535f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:29Z",
                "name": "console-public",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2189",
                "uid": "fb3a9524-6fc7-454a-9e4b-cdab01025486"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-public"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:28Z",
                "name": "insights-operator-etc-pki-entitlement",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2110",
                "uid": "9f459243-c993-4691-a71e-ac13cd3e6c16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-etc-pki-entitlement"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:11Z",
                "name": "machine-approver",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1008",
                "uid": "273d36cf-d851-4c92-830e-1c2214ecc0ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Grants access from any authenticated user to the openshift-network-features ConfigMap"
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "openshift-network-public-role-binding",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "3301",
                "uid": "60200194-0047-4079-bdf2-31404c48cd9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-network-public-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:deployers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3465",
                "uid": "22d6bea3-9cfe-4c72-a942-ab7a25498fe1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3486",
                "uid": "5caec97f-9912-413c-8796-a468820588ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3488",
                "uid": "fba6e181-1a49-46ca-b2e7-d8f3543db595"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:22Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:oauth-servercert-trust",
                "namespace": "openshift-config-managed",
                "resourceVersion": "1595",
                "uid": "6dfa00e5-e1c9-4c5d-987a-bd2fed8a20ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:oauth-servercert-trust"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5985",
                "uid": "d180abaf-5250-4a41-a6f0-b9531e12ed55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "4695",
                "uid": "27a5f79a-b8a1-4278-9852-1873c4583ab9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "4810",
                "uid": "5659ccc4-1870-4685-aed6-0c4ddd0acb8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5312",
                "uid": "4c27f6c1-ea73-4e4d-a414-1bde1883e4bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5196",
                "uid": "ea3209ce-9ac1-4b3d-873f-e33113a13309"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5764",
                "uid": "6543a2a2-df1e-47b6-aac4-154cf26e0945"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5086",
                "uid": "883d1c72-2499-40a7-a674-251b383c7231"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5415",
                "uid": "a5986bbf-0ca2-42d7-8a2d-776eb0d652c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5337",
                "uid": "3c0ea9eb-c0b7-47f0-a3bf-3971a63a88f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5714",
                "uid": "b6e6ee09-8966-4128-a65a-3af086ab1ad5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5824",
                "uid": "f0411494-58ab-4065-b045-d18ad27e3f69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6334",
                "uid": "837c8e88-7188-45f5-887b-78b0a2a6b43e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:27Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2044",
                "uid": "bd0d7288-857d-49a4-bde8-f43311cee7e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:deployers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3487",
                "uid": "d0552b30-23e6-4f3f-b9d2-a4d7d53d0eaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3515",
                "uid": "cdb03eed-0eb3-47dc-aaa8-50a775a22cda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3514",
                "uid": "9a79126f-626d-4b51-95f6-f7aabd254882"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config",
                "resourceVersion": "5977",
                "uid": "cf5dc171-0f6d-469a-9c5a-39a3bceb48da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config",
                "resourceVersion": "4686",
                "uid": "fd1711d5-6a71-4c3d-a97b-50ae280eb40a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config",
                "resourceVersion": "4710",
                "uid": "7c8aec19-dc36-441c-84b1-631305a0dae7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config",
                "resourceVersion": "5243",
                "uid": "41c81068-c760-4ac9-afde-040457e3880f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config",
                "resourceVersion": "5203",
                "uid": "6f3e7c9c-e7eb-4bfb-8b4c-24deb6036c32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config",
                "resourceVersion": "5758",
                "uid": "fe8978aa-814e-4761-b734-1fe5f499808e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config",
                "resourceVersion": "5085",
                "uid": "62dd5cbc-d9f5-4cda-b7e1-32b47bbd6379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config",
                "resourceVersion": "5411",
                "uid": "f0084f46-0c75-4bba-bdcd-151f402d68ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config",
                "resourceVersion": "5477",
                "uid": "53dd1ff7-6753-4530-ba87-deba88f1d1c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config",
                "resourceVersion": "5780",
                "uid": "04cd588a-6b94-4704-a382-aedef28c3bf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config",
                "resourceVersion": "5797",
                "uid": "90b16d3c-74e4-4689-a902-adf922201cd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config",
                "resourceVersion": "6191",
                "uid": "895ab665-0c90-4bf2-9cba-b7f08fede227"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:12Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1033",
                "uid": "4eaf42da-b13f-40e7-9a10-0a7fa4ce3bcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:27Z",
                "name": "cluster-samples-operator-openshift-config-secret-reader",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2022",
                "uid": "10935bcc-6305-4cab-8cdd-bafad0145dd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "coreos-pull-secret-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:30Z",
                "name": "console-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2191",
                "uid": "4496b3cb-abaf-4433-b8a6-2b2ce7ef725c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "dedicated-admins-project-request",
                "namespace": "openshift-config",
                "resourceVersion": "5938",
                "uid": "d4e5cf57-283f-4953-b1c2-d285b0c902e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-project-request"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "dedicated-admins-registry-cas-project",
                "namespace": "openshift-config",
                "resourceVersion": "5317",
                "uid": "3cec5b78-8570-4524-90ba-cb8c004fd36c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-registry-cas-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:20Z",
                "name": "ingress-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1331",
                "uid": "acd518fb-d110-430f-9522-684e4a200e84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:25Z",
                "name": "insights-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1810",
                "uid": "c8291f22-fa19-434d-bbd4-41a400b680e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:deployers",
                "namespace": "openshift-config",
                "resourceVersion": "3438",
                "uid": "ef57a1d6-893c-4afe-9470-1dad09bdfe5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-config",
                "resourceVersion": "3450",
                "uid": "0e5efa96-b48a-46bf-82aa-2900973bd7aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config",
                "resourceVersion": "3449",
                "uid": "8d98918d-14db-4f08-9b3b-8006dc432502"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5987",
                "uid": "f03c3df6-c3d1-44fd-80ec-d4cbffd38731"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "4711",
                "uid": "ac992593-ab5d-44a7-b2a1-da5d961fd9a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "4837",
                "uid": "bd22280a-a910-4413-87f9-5af36ea6f4ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5165",
                "uid": "0bb9c7e4-be87-4d3c-8cb7-6555d2c3886b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5145",
                "uid": "035d479d-5143-4e0a-8cfd-b078ad804665"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5750",
                "uid": "30c5cbc7-0f97-4a2f-90ed-1bfabfda23e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5113",
                "uid": "ec23a0d3-5bf4-4214-ba2b-39675f802e5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5321",
                "uid": "71d0a02e-d595-4b05-a2b1-37e2c1201581"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5365",
                "uid": "6a53d7a1-0d4c-4b93-b41c-f8032705b77b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5807",
                "uid": "479e6c9a-c15e-4e1e-903b-aa37fca99136"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6016",
                "uid": "5313f289-9aec-4ec6-a3dc-e7fe403ab0f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6229",
                "uid": "b0167f51-610d-4adb-9d76-4d86dbf88ae1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:29Z",
                "name": "console-operator",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2185",
                "uid": "36036846-7741-4443-8a47-2336b5a28c5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:37Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2467",
                "uid": "6bf400cb-ce3e-4009-8b68-65c8d7fb0d55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:deployers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3541",
                "uid": "5d6bd44a-8c33-4d21-affc-651d74c68993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3548",
                "uid": "0ec8479c-74c7-455f-9025-648e3f7fae9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3549",
                "uid": "5ecc92dd-81dc-4ed2-a6ad-b0a0de73f935"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6140",
                "uid": "a73fac48-3675-4794-98ab-ff0d3fd6a407"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4763",
                "uid": "6bff3878-6902-437f-8ab5-b7a212bdb14a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4779",
                "uid": "736361ae-1d6c-49a6-8b8d-6199b2726b3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5154",
                "uid": "a7d6fab7-4941-443e-951f-43f1271a37ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5133",
                "uid": "0ca7e3ad-4d8e-4da8-9e71-12af1ea6df19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5592",
                "uid": "b6eba50f-fd8b-408b-bb0f-baa6768ec9e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4930",
                "uid": "60efc287-a73a-4d87-a3ce-1e40db8ae5ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5380",
                "uid": "01aad2ba-05ca-4a2a-b71e-f2ca46c92cd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5401",
                "uid": "d0f2c207-fe89-4892-909f-a719c034ead1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5724",
                "uid": "f5ad2ce1-f39e-4c4f-b3bc-dc21bceaa544"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5991",
                "uid": "9eac6cb9-f834-4a41-b181-71773fc5ca4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6167",
                "uid": "78a9aba6-c7d4-4a7b-8190-86cdbd7ad999"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:28Z",
                "name": "console-user-settings-admin",
                "namespace": "openshift-console-user-settings",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2103",
                "uid": "b05ef12c-7d96-436b-8620-b83f76303111"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-user-settings-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:deployers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3564",
                "uid": "2a3cf9cb-ad2f-44f8-a7f2-4b4eeb5d3557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3574",
                "uid": "30344166-417d-49e2-80f1-3b5489d67465"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3573",
                "uid": "31430571-b3f1-4297-95b5-d57af6a7e3e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console",
                "resourceVersion": "6155",
                "uid": "3cd08df1-a52f-48f0-95f2-5abdc8de4a13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console",
                "resourceVersion": "4793",
                "uid": "6e0c8ed7-9cba-446e-a28d-6cfd05ff68a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console",
                "resourceVersion": "4722",
                "uid": "4ee5826f-166d-4e77-8e7e-48a1adf6dbcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console",
                "resourceVersion": "5314",
                "uid": "afa62ff7-cae6-4727-9421-760fb2d4c2e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console",
                "resourceVersion": "5177",
                "uid": "754ac8b5-6940-4a06-8e11-949f1d2a23ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console",
                "resourceVersion": "5709",
                "uid": "5894ce4f-e387-4f0b-a103-16ea6167f952"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console",
                "resourceVersion": "5043",
                "uid": "387c86b7-2102-443b-9625-2927e92864ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console",
                "resourceVersion": "5344",
                "uid": "5f9a692c-b66f-4976-956a-bf3e874cc54e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console",
                "resourceVersion": "5445",
                "uid": "132442f7-6b29-4e24-956b-3314379d440a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console",
                "resourceVersion": "5694",
                "uid": "f81d1cd7-68e0-4575-af07-56abec46856c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console",
                "resourceVersion": "5821",
                "uid": "efd775be-3c58-4276-b721-aff7d3455047"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console",
                "resourceVersion": "6286",
                "uid": "16ba8f31-fde7-4b03-a7e5-69bf3cf5e37e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:29Z",
                "name": "console-operator",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2181",
                "uid": "140ba532-1542-4ba8-9321-5d63dc955f39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:36Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2421",
                "uid": "d217d581-b821-4aed-84c6-c3aabad1b7fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:deployers",
                "namespace": "openshift-console",
                "resourceVersion": "3526",
                "uid": "6d94790b-4549-470f-b8a0-968753a5c6fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-builders",
                "namespace": "openshift-console",
                "resourceVersion": "3525",
                "uid": "dc0d5e9b-0faa-42bd-bb0a-608ba1aae5cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console",
                "resourceVersion": "3527",
                "uid": "58fd7c12-8b52-4a65-a1d1-99e2f3a8a7d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6119",
                "uid": "a1cbab79-4bc0-418d-8dd9-6b55b7641723"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "4756",
                "uid": "9f35b7e9-4e68-4a85-b781-304eb8e43d41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "4877",
                "uid": "2176a006-13ec-481a-9185-b672fb56ea64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5274",
                "uid": "d04ccf37-67e3-4bfe-b4d9-afd63c70a0a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5181",
                "uid": "0cb53a01-6340-45e4-8b2c-e949521e1e95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5621",
                "uid": "988a0396-62b4-4b69-9a95-31d96c6f0e63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5097",
                "uid": "9cf9e072-81c5-4c4a-8a03-d433fccd7718"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5454",
                "uid": "5d811ca4-ed6c-4839-ad28-630949386b6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5441",
                "uid": "2c52d852-3fc7-40f8-a574-3a0f17009585"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5756",
                "uid": "7112a8e5-dfb4-4b17-bed1-6987f5b5c921"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6020",
                "uid": "fdf8cfb1-ca80-4f10-a15f-1b14e9945c4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6292",
                "uid": "f55ddf29-3e05-452b-ae21-cd754456f3a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "836",
                "uid": "5debbb69-6f2b-4146-9dcc-d202826b4f81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3607",
                "uid": "4bcdacd4-25ed-495d-b930-38925b55e457"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3617",
                "uid": "8fb554c2-8908-4f1d-85c3-34726f4de07b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3616",
                "uid": "284046e7-7543-477a-b031-2c812777da63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6180",
                "uid": "40b82fdb-c515-4a33-b4fb-35d614ba0bc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "4750",
                "uid": "64ae8790-e6f3-46cc-a546-9d6a8a3ae2ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "4724",
                "uid": "4928af9c-3765-41cf-a541-c5a4032a48d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5224",
                "uid": "d614125b-0860-455b-9864-9aca1da7e5bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5078",
                "uid": "0fcf15ff-169b-42c4-9826-c7eafef7a536"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5728",
                "uid": "0bc1f91c-4c2e-4be7-ac83-2863e35edf30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "4910",
                "uid": "7c6fe288-106c-4e6d-9da0-14e8bdf19cf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5336",
                "uid": "abfaac59-280c-4411-bd7b-29db837dd460"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5340",
                "uid": "ae242b6f-d0e4-4378-9ab3-cd113ca0de53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5665",
                "uid": "ce7764f1-c71d-48fd-a025-e1dae77bb5e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5926",
                "uid": "233f0981-4d98-4c76-bd49-02feca6293b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6230",
                "uid": "745830dc-6ade-4b06-a04c-19d5fec378d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3586",
                "uid": "febd15a2-b5c9-470e-8492-daa924b99cb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3594",
                "uid": "ff908a7b-7b6e-44ac-8632-3beeca1b6c36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3595",
                "uid": "7f8774ec-6f31-4774-b693-ceb379acd95a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5979",
                "uid": "3db0763a-cd0c-4b2a-8556-268656c0ca40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6454",
                "uid": "c8b4e252-f1c7-44a3-9afb-b3679dac61cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:33Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6475",
                "uid": "c53f98b2-7259-4ec7-97a7-7bb690c13bc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6572",
                "uid": "2946c772-52ab-42a2-a9df-66b124048361"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6520",
                "uid": "0e1074c0-5071-4b4b-8ee1-73ce99964ddd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5660",
                "uid": "326c529d-d5bb-4f38-ba87-cdd7e470d263"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6548",
                "uid": "9cf2a94e-5420-4ad9-9a02-659e0e9d22be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6617",
                "uid": "9a895ece-9707-4ec8-9a44-825b0582a940"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6581",
                "uid": "7544b498-2ea1-4008-b4a3-83b1c593a985"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5742",
                "uid": "b15e65ea-64ee-4177-a066-94448a72890a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5829",
                "uid": "34f2aa77-04d1-4636-9999-b4ca926a21fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6347",
                "uid": "d510b2f3-0828-4d32-91ad-218d1616a8bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:36Z",
                "name": "dedicated-admins-customer-monitoring-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6500",
                "uid": "f4555e99-85bb-4a93-b187-27fec98991cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:36Z",
                "name": "dedicated-admins-customer-monitoring-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6504",
                "uid": "61af47bd-7c65-43aa-aa87-4ba29ca4b4f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "dedicated-admins-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5542",
                "uid": "024fa67e-a1aa-4096-b16b-c641304b9c70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "prometheus-k8s-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5539",
                "uid": "4b1df978-6ad8-40c8-9f56-f8e4d020f062"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "system:deployers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5505",
                "uid": "0afb439b-8df4-42c1-bdf2-d4fe2732d713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "system:image-builders",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5525",
                "uid": "61b0249b-d371-46ec-b7c1-d191de4d159d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "system:image-pullers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5506",
                "uid": "ca9325a5-8b9f-41de-8b12-54564ff3b085"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6174",
                "uid": "9e4ebe83-6d15-4158-adc5-901e40fda9b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6457",
                "uid": "af539a48-f0db-4e36-b44b-38bbd0ab9fa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6462",
                "uid": "7ba7a5e5-0d0e-47a8-9feb-dcfa6feb22a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6586",
                "uid": "e651ecc7-b83d-4b53-a964-08d2dc27733b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6523",
                "uid": "b0c72c4c-925a-4991-968a-9eb73fb22b62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6703",
                "uid": "095f1f12-462c-460f-ad4c-32814295568c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6517",
                "uid": "3250adc0-48af-4783-8732-12fda0e13562"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6624",
                "uid": "31bff895-7457-4605-b0c4-c4e0e5a626a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6609",
                "uid": "8394bf8c-dcc8-451d-bc92-dfbabd736409"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6708",
                "uid": "30eae0e6-7080-4d7a-be40-89e95c8e6c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6743",
                "uid": "a97a72bb-6b8d-4ee7-983e-266aa2b9818b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6252",
                "uid": "82a3a68f-61ee-498e-a0c0-b271b4bb5f00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:52:35Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501",
                        "uid": "fcbb34d5-af9e-4199-9e8d-0c13730ccfb7"
                    }
                ],
                "resourceVersion": "12940",
                "uid": "2b499f7c-810a-4632-82cf-7a8491dde56e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:52:57Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.568-g6f8f204",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "beNNEPNCBMnqobMI2YMXq9kNCLfRSRLBt47UqL",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-5YA1aCKquPNrz8HhLlSV6pmzk5bO0L7Eebnsrf",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                        "uid": "a81fd16e-9f05-4e17-bbaa-31565bb8651b"
                    }
                ],
                "resourceVersion": "13303",
                "uid": "ddcb601e-6c3e-4137-9b4b-43637229a7f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-op-5YA1aCKquPNrz8HhLlSV6pmzk5bO0L7Eebnsrf"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:52:55Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                        "uid": "70c2f66f-06fd-4b43-ae79-27c646108a2f"
                    }
                ],
                "resourceVersion": "13191",
                "uid": "8d307e31-0a12-4883-995a-dffb960ee0a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-operator.v0.1.568-g6f8f204"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "system:deployers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5884",
                "uid": "fe4c03fa-e123-471f-b7fe-4be5559456d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "system:image-builders",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5885",
                "uid": "8bd09156-94aa-4139-a0d2-cf289c36a554"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "system:image-pullers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5882",
                "uid": "5da15840-4bb6-4b00-8622-8e7519dc3531"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6082",
                "uid": "49e7dcd1-7410-4724-ba99-a50f077c500a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "4813",
                "uid": "57b5a3bb-09ad-4980-9b4b-bf9afb954b6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "4873",
                "uid": "38f3a4d6-40c8-47ba-b02b-fa57844da7b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5176",
                "uid": "3b4538d8-0733-49d4-abdc-6074d145ca2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5062",
                "uid": "cd361bb7-8e31-4773-b3e9-ecd2f8041442"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5630",
                "uid": "d46d69e9-c05a-4dc4-a7c7-d3623967c01f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5071",
                "uid": "f6259c5a-ca52-401e-9b40-863dc5914181"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5435",
                "uid": "ba702c7f-f403-4264-85bd-6b1820452d5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5367",
                "uid": "8db46e7a-7531-4fa4-a4f6-a29c5a559f1a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5726",
                "uid": "57a07034-4965-405a-9c97-c1318e14bde8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5936",
                "uid": "5c4fc4a5-fb1d-4e7c-a101-81b719ad55c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6338",
                "uid": "5472c05e-4a86-4e16-93eb-726c2fdefc77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:11Z",
                "name": "dns-operator",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "990",
                "uid": "84b7f254-a762-457b-ac14-30cd0e44e50b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1001",
                "uid": "8a79f658-011b-4a8d-9f94-18905bf15bea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3651",
                "uid": "164ecdf2-a083-43f6-9af7-34daada95f78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3679",
                "uid": "e0977bfb-5958-432d-994a-e0081bb6aad6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3662",
                "uid": "e809f327-c44b-487d-b053-e3c84fea9bda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6181",
                "uid": "eb7d0450-4bf6-4406-88dd-b0a4b40ebba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4716",
                "uid": "420a384f-2e15-4d88-8ae1-cdfdb60602db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4761",
                "uid": "dcb52cd0-d119-4ac4-ba25-aa60a0d4dea2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5286",
                "uid": "50e0aafe-9ee1-4d7c-9ec7-5b289529f17e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5187",
                "uid": "365d1d58-6560-4a62-bb5b-941778c2d564"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5581",
                "uid": "8c81c9ca-45d6-4490-94e9-c6bc62d1803f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4917",
                "uid": "9abdf67f-ab6b-4b5a-8839-e61d984a0247"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5423",
                "uid": "ce36cf61-d840-4df1-864d-97be51458b0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5375",
                "uid": "0d6be38e-80e6-4ad4-b94e-0fbd3890c1e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5703",
                "uid": "e20b34d1-4dcd-4535-b3c9-3b37a7bfa2a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6041",
                "uid": "1f638d17-5b0b-41fd-8ac3-3f079f5a0ff6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6244",
                "uid": "e4a8a269-e962-47f1-8338-551760a8060e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "dedicated-admins-openshift-dns",
                "namespace": "openshift-dns",
                "resourceVersion": "6314",
                "uid": "32902ff9-09fa-4c26-b3ca-092e68784370"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-dns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns",
                "resourceVersion": "1818",
                "uid": "b0b331de-375c-4298-a6f9-30378155570f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:deployers",
                "namespace": "openshift-dns",
                "resourceVersion": "3631",
                "uid": "2e819bc0-4c7f-416a-ac6a-12111e4714d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns",
                "resourceVersion": "3639",
                "uid": "166c4b9b-0ab1-4181-9c89-5ec51ec10306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:01Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns",
                "resourceVersion": "3638",
                "uid": "0d70e931-149f-4d52-9b08-eb8827896977"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6034",
                "uid": "1b65cfbe-e2ae-4b54-b0e2-83d90990c326"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4816",
                "uid": "323776b6-c85e-4572-ba41-274802079bd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4783",
                "uid": "a615e3bc-bb78-47d2-aa34-4d114d7ec802"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5169",
                "uid": "e75cccf0-d2ea-4d05-9db9-14febbd478c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5166",
                "uid": "0914a8a6-b41b-4546-9339-2b0ed915f5c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5631",
                "uid": "9baa3d94-e0d0-4474-91f7-834b86bdeece"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4919",
                "uid": "c0521d43-49e9-4e80-9719-8b05bef233e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5324",
                "uid": "15d8aa9d-81d9-4ee4-9569-db4e9eddd993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5447",
                "uid": "b4e2ea18-00ef-4080-ab2a-46f17e4be97a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5782",
                "uid": "726e57a0-4e02-44fc-8955-61ea7d3d75f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5798",
                "uid": "406d51a3-cb38-41e7-84ea-cb211a3727f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6372",
                "uid": "aaf8ef08-c358-44d3-860a-07cb9feb2a6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3680",
                "uid": "7b183d65-d9b8-46a8-a283-4f4d8e8367dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-etcd",
                "resourceVersion": "3687",
                "uid": "a294c265-1639-4a06-b7b7-990bfe50bd53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3688",
                "uid": "2154fec4-b0b3-4a31-952a-e5e2d03a5392"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6036",
                "uid": "877db999-5a3a-4246-a5d4-ad6b7cccbab2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "4758",
                "uid": "95b483c9-ba3c-42fb-9902-7e7ee0ad2479"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "4726",
                "uid": "c3d332cf-c40a-440e-b5ef-bd11e759af7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5134",
                "uid": "ada3b280-8c9a-4968-b355-f808be0108cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5119",
                "uid": "e4fcc072-89a9-412b-9586-62bc630b99de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5692",
                "uid": "dbead914-6d8a-40ff-8bc2-b5094bddfbdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5045",
                "uid": "5a5bf5cc-9677-48d4-a96d-e2bc5b3c37e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5368",
                "uid": "4b5fd1c1-58ab-4291-b717-c151c9377d70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5479",
                "uid": "c2d46cb0-824a-4ae9-be58-79707725123f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5810",
                "uid": "97c2849e-0a40-48ad-804c-4eb24cf78294"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5931",
                "uid": "3f849e5c-7ebc-41b6-8040-f6558a18b709"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6352",
                "uid": "95ddc80d-0ced-46f0-901e-554f6229dee9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3702",
                "uid": "1ab794d5-96a7-41fe-8bc4-84ae6dbf1d70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-host-network",
                "resourceVersion": "3710",
                "uid": "89bf1b47-0a98-4068-9928-48e1b59cb790"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3709",
                "uid": "28188717-4a51-4667-b4c3-ee1c206150ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6051",
                "uid": "af595c6d-fafa-450f-a929-ce84aba95356"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "4728",
                "uid": "3d5ffb83-f290-4028-b244-be67c1876827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "4757",
                "uid": "01324c86-68b5-4c82-8cda-eff07bad8146"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5276",
                "uid": "d8bbe5e1-45ca-4ce6-bcf4-40a179e28289"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5206",
                "uid": "98542132-d6fb-44ba-b338-8a172ffdd572"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5752",
                "uid": "4d6de60f-262d-4eee-ab3f-c48c42a5ebd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5075",
                "uid": "42f56df5-143b-4caf-ba58-cfb440033709"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5373",
                "uid": "4c041c70-0b23-4f48-a606-0d9901daeb3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5322",
                "uid": "3a372e74-f8b9-49a0-b7a1-361073655e56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5757",
                "uid": "2086df4a-1d3a-4b93-89b0-1eb15c60b3c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5940",
                "uid": "d6c08051-67d1-407d-8fc1-bfb38359913e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6193",
                "uid": "8a15a7f3-2059-4782-80e6-0463b5785fa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:24Z",
                "name": "cluster-image-registry-operator",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1736",
                "uid": "09c56446-b3e2-4788-9d3e-f202fa358576"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:26Z",
                "name": "node-ca",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1979",
                "uid": "e9ee5258-3000-4057-99bd-86ed21338ca7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "node-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-ca",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:08Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "873",
                "uid": "67d76ed0-60d4-4ad6-ab60-8f3f03c4f28a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3724",
                "uid": "b4f181a7-f106-42f2-b457-d19e3003da0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3732",
                "uid": "e64d501c-23e6-490c-b8cd-d58c0dfbdb69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3730",
                "uid": "6ece9cdf-9404-47a7-bdce-26579da346ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6183",
                "uid": "e5923487-0865-4e92-bd37-e0f8bc7ffba0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4782",
                "uid": "a9c4fe7d-b6e3-467b-99c5-a6e10f21725e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4798",
                "uid": "b109a5c5-a7e6-4fb8-a54a-da179056d46b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5195",
                "uid": "035fd965-49d9-4c9c-adfb-76629419ad6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5065",
                "uid": "b07db1d3-473b-45da-bb15-290ba0aa434c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5695",
                "uid": "5bd283db-4231-401d-98bd-27264aef7c8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4971",
                "uid": "83deac8f-c83b-4887-b763-e51189d57272"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5473",
                "uid": "1592a220-e668-4e18-bc5d-b270aff691e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5378",
                "uid": "fe7b0545-7943-442c-ae7c-05a3b8849212"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5705",
                "uid": "0548040a-2b9b-4980-99a7-cfdd3f4616a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5967",
                "uid": "43a4062f-2f7a-47ba-b0d9-3c1725493868"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6373",
                "uid": "c0684177-6b06-4e49-adf5-d2fe8eaa04af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-infra",
                "resourceVersion": "3731",
                "uid": "24cf8124-9918-4d13-86ce-239878551975"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-infra",
                "resourceVersion": "3751",
                "uid": "545f88cc-7dae-4444-a3af-c673d47655d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-infra",
                "resourceVersion": "3750",
                "uid": "0d16d420-28dc-44eb-b1bd-3782aea4de00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6001",
                "uid": "bd502e22-4c0b-4897-8fa0-c9750a997efe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "4817",
                "uid": "623ad131-ca65-438c-a6c6-5e1344e07bc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "4747",
                "uid": "13e92655-8731-4fc2-bd27-a7b7bf1cf0fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5209",
                "uid": "c8a05d68-518f-43d4-a21e-4e35d5a5bb6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5153",
                "uid": "8962ecb9-4170-4467-bf10-e36c743c85f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5661",
                "uid": "06c048c0-10aa-45f9-a0b5-7567ea3b6043"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5090",
                "uid": "81860c1b-253a-4353-a828-0731d56139b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5347",
                "uid": "123ab3f4-803d-452d-af0f-1af23a21758a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5409",
                "uid": "146f7f5a-5992-4fa3-b278-4dea3d0b9b3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5683",
                "uid": "2df31a12-c722-4fa6-8e86-169e374fb590"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5831",
                "uid": "7ece3f06-62cf-451b-9e87-a6020c22ad2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6232",
                "uid": "9f86b9da-45f0-448d-9665-243fcb40c32b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3779",
                "uid": "61860990-82ad-485b-8763-8d849c8cb248"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3794",
                "uid": "66c592e1-aea8-4f55-86b9-7148f08c7ad8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3795",
                "uid": "3346e083-2b74-430f-92c9-525f5448f8f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6121",
                "uid": "94fda3bb-a50d-4d78-8f75-aa7a74beccac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "4784",
                "uid": "5ea590ce-e9a5-41a9-917a-838c7503d49c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "4818",
                "uid": "9e276929-4fa4-45b3-a770-b04928594812"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5226",
                "uid": "0aa1fdf3-414d-49de-b8a4-e871be7d6f3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5069",
                "uid": "51b17e2b-3c4f-44d8-a407-c8ac50bfd5f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5571",
                "uid": "80bc6417-d1a8-4db8-8579-ca9f66fa049f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "4912",
                "uid": "496e87c4-32cb-405b-8828-973c9a3a1f57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5376",
                "uid": "c05d6fb6-fcc6-44f3-9573-63f49139c47a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5323",
                "uid": "991f6d0e-a9f9-48b5-8058-262aa89eb44f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5696",
                "uid": "d5610a62-0bc3-4069-9542-bc4093e746d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5851",
                "uid": "b41f4fc5-1424-4f60-8285-6c81e5a7c1d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6322",
                "uid": "7a34ea13-93a0-4b9c-b3a7-4f5a65837c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:19Z",
                "name": "ingress-operator",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1265",
                "uid": "20a898b3-1545-4e58-a5ad-ff696fb8af64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:37Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2446",
                "uid": "5232a57d-ef95-4bca-a677-92db1b0e4378"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3802",
                "uid": "48541c3b-38a7-4d56-911d-e89b3676a10c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3819",
                "uid": "e82a1c0d-f584-481b-a03a-29d396dbe2d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3820",
                "uid": "e19fdfee-a4ad-433c-9e9a-fa380656cfd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5982",
                "uid": "4ccb350b-179f-404a-afdd-639c5f9f3f19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "4718",
                "uid": "5c68e2ce-3312-47d8-8c98-dc886da380f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "4814",
                "uid": "417925f9-72ea-4a7b-84e2-c06c340061f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5235",
                "uid": "97e222a7-5c52-44b3-9fdf-0571aeb5d668"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5121",
                "uid": "19047f97-6470-4d11-ae56-f6ee45208a1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5628",
                "uid": "83ef52a9-e3df-4df9-9665-d29d9e5657f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "4920",
                "uid": "eff54e13-9fce-4728-ae60-fe25c0d142d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5437",
                "uid": "fb17af28-8d21-4fc7-b304-e0605fba8312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5370",
                "uid": "2b01eafd-74d3-4f65-b70f-9bf5ee55dafe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5707",
                "uid": "63358a75-fade-4960-9021-5edbf09c314c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5827",
                "uid": "75952b9a-6fa5-4a8c-90bf-f248803c4a53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6353",
                "uid": "c6b24929-5b5e-492b-bd8a-f61ba476df96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:27Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress",
                "resourceVersion": "2009",
                "uid": "9a258062-d0f5-4db4-9d99-3956cb4a24a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3757",
                "uid": "0e5ca733-d49e-4fb7-8169-78a778a7f79e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress",
                "resourceVersion": "3772",
                "uid": "9e560e02-b669-4a44-a1b8-1cd9e3c0ad93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3771",
                "uid": "55e8cb7c-2080-4ff5-b00e-3e45bdebd954"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6010",
                "uid": "a0d581aa-980f-4197-b6a2-e72edfdd5df5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-insights",
                "resourceVersion": "4806",
                "uid": "a0cb1ab1-cef0-414b-8f3f-90585ae51ca5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-insights",
                "resourceVersion": "4822",
                "uid": "bf1ad254-8842-4c6e-b136-8b8819cf63fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5198",
                "uid": "d9548189-aa0f-4341-b3e5-9e6b8597f016"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5070",
                "uid": "50d239ff-608c-4053-9e89-5b9acc66f6f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5615",
                "uid": "3c552ff2-05f4-45c8-a5c0-1b86dcd7f5c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5115",
                "uid": "23eb8110-3980-4567-9c25-5cccb12c0c39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5439",
                "uid": "402c886b-f7c2-4004-83b8-9c374b65f9b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5352",
                "uid": "978bc8dd-8eef-455b-97d2-126faea8d850"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5828",
                "uid": "b1d1605b-492c-45c0-8230-81c9144af635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5854",
                "uid": "dde82a19-9a49-4b17-b39b-1aa2fffedce0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6233",
                "uid": "c02434cf-5153-48e2-a312-28d67e09b437"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:26Z",
                "name": "insights-operator",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1911",
                "uid": "fd3932ab-76cf-4876-b52e-4f97e7107fd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:27Z",
                "name": "insights-operator-obfuscation-secret",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2027",
                "uid": "e20f040f-a970-450a-9f44-cae9fa77fbaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-obfuscation-secret"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:31Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2245",
                "uid": "76a37ca3-22e1-419b-a09c-0160129270ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:deployers",
                "namespace": "openshift-insights",
                "resourceVersion": "3827",
                "uid": "31e7e361-92ed-4413-863e-93d4b29e0c55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-insights",
                "resourceVersion": "3841",
                "uid": "8cab5df8-94cb-44ed-9a10-844e224be702"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-insights",
                "resourceVersion": "3840",
                "uid": "829c372b-99c7-4837-a897-c38fcd1aaa96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6003",
                "uid": "973e0318-8811-4646-ac90-b0c907e9d1b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "4825",
                "uid": "63764a5e-5aaa-4c92-980c-0bf0b3c10471"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "4765",
                "uid": "624d1222-81a0-4956-8230-d2c84766e26c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5170",
                "uid": "536dd7eb-c229-488a-b460-0b5671bc34b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5089",
                "uid": "902aef82-4043-49d0-b88a-ee6ade2f3f16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5711",
                "uid": "51c8784c-7d97-4607-ae25-d6568e87ab30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "4962",
                "uid": "b328c88d-e0a8-4c3a-b565-965721211b37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5475",
                "uid": "da168f07-3361-45b5-942d-f591e163739f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5372",
                "uid": "cb1fb681-e049-4fe7-90f3-46a48c9aa082"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5774",
                "uid": "3303506a-407e-4077-b0e5-e571174d0fa6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6045",
                "uid": "d1ec0108-83c2-4725-a7fd-3b6f355ef88c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6325",
                "uid": "eb218426-9372-4550-b4f2-60d226f2f5e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:37Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2453",
                "uid": "1bd61db4-da46-4b83-8cf5-c582566c569c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3871",
                "uid": "14cf237b-2cf9-42fe-b783-e1d59d7996b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3886",
                "uid": "34264712-4568-4fde-a177-0a25509cd0d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3887",
                "uid": "f0261cf4-d8c7-47e1-9bb9-24aaf096527d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6040",
                "uid": "179e1755-ed49-4a1b-bdaa-6424f8b656a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "4721",
                "uid": "933d352e-3d63-4e07-8db7-7adb067e7e1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "4749",
                "uid": "9e4981e9-62e2-4d3c-9801-e20a80734e78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5230",
                "uid": "f5bc4af1-7615-4c36-9f70-416a89ee966e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5217",
                "uid": "02645fd1-a29e-4dd0-939a-40c53c1b6af2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5699",
                "uid": "7a5bbaf2-5c9f-4cfc-839f-945eac955754"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5117",
                "uid": "8c873981-0df9-4e2a-88fd-341b9f529b32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5478",
                "uid": "139947d5-31ee-453c-b0b2-4732768e2e9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5330",
                "uid": "3035a8ea-eacc-4b7a-a554-b2a9dda042d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5759",
                "uid": "e31a8de1-079b-4b8a-9cc0-803f2c4ea94b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6023",
                "uid": "ebd43ecf-0d43-42ff-a5ca-171504e754ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6247",
                "uid": "04ba90ed-ed5f-4a28-9f00-dc4502989a33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3849",
                "uid": "2b87e94e-7f5f-4333-b9fe-aaf8bcceddb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3863",
                "uid": "bc3b71a3-7077-4b7d-9844-dea979112a8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3862",
                "uid": "70870e85-ab59-4e6c-9cd5-ea4ca5818a74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6163",
                "uid": "7340e413-5f16-4988-a655-1e8757b943ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "4795",
                "uid": "dd82baa8-d3f4-497d-aca9-411d9b2cf966"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "4729",
                "uid": "e649b7ed-3f6c-483f-9792-4e3c225817dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5138",
                "uid": "aca4a4fd-9b26-4fd9-b100-e40425036c06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5139",
                "uid": "2a9c6de6-f25f-44ba-9d12-6c36a12dfb18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5671",
                "uid": "1ddb1d69-a480-4666-9216-9ab3f1ee2d21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5077",
                "uid": "fd286b7b-d63e-4cf0-b960-2ccb0767e0f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5405",
                "uid": "fe036738-dfe4-432b-b86f-b2c21755cb93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5355",
                "uid": "b885c2c6-0873-439c-ba30-5409564a524a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5811",
                "uid": "60f90773-21c4-4e7e-a970-657a9834a787"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5972",
                "uid": "6d683b1e-c64c-441a-95b7-39cf7072dca1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6215",
                "uid": "ea9bc85d-dc4c-467d-8b09-dc0d8e9188c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "722",
                "uid": "5e5dc562-9b0f-4435-b45f-38f4db3c04e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3920",
                "uid": "015a4a4b-b794-494d-8f56-5a09d87db9e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3932",
                "uid": "864204b4-ba47-40b3-a9f9-4c29df822eed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3931",
                "uid": "18aea0a5-8e77-45d0-a40a-8af423be3eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6013",
                "uid": "7b438ccd-2b27-4cad-905f-a1f01fd3111d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "4736",
                "uid": "8d805c42-269e-4821-a5e3-d28f8909c4d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "4880",
                "uid": "f88e69d0-278e-4672-874d-fe7e38e2c65e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5303",
                "uid": "6f9fe66b-3457-48da-9c56-635b37aceb20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5182",
                "uid": "12a0d6c0-64ad-4079-937d-1ed5e6feea99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5583",
                "uid": "e52eb692-6fb9-402c-964a-4e675e02847c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5051",
                "uid": "b6db9580-237e-4608-ad8a-33583c44b01f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5338",
                "uid": "a92ba330-a8a6-4f30-835b-f561707ad2de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5403",
                "uid": "3613a9e8-3061-441e-b2e8-e8f04c8a8a3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5784",
                "uid": "afae06dc-d927-4b39-82bb-a23b332f116e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5942",
                "uid": "efdf9e1a-6c58-4af7-a67e-9b0fa28abd74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6339",
                "uid": "5acb3ead-52b7-4f82-a951-24b4140d9ea0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:22Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1576",
                "uid": "3bc25d66-566b-44ad-8504-560c989a4fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3898",
                "uid": "ffa33af0-94a0-43bd-bbb0-eb41843adb5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3907",
                "uid": "66e81dbe-781e-48ee-840a-5355e52a4ce3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3899",
                "uid": "da05a446-0876-4f10-a999-7132f7752b6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6148",
                "uid": "e8e0ec78-f1c9-4488-b292-df4e26faf9e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4745",
                "uid": "7c82b2b4-598c-4ee0-85d5-c579a2c754ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4769",
                "uid": "53db9c25-af43-482e-90bc-496aa941d1dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5280",
                "uid": "32573da8-6996-453f-bfb4-fb510eb064d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5049",
                "uid": "18db7b35-4cdd-4b14-a9f3-8fade4577a7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5761",
                "uid": "bdee271f-2658-4aad-8b3b-5d4761674373"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4994",
                "uid": "55e3333d-14d4-434d-a176-7a64dd2faf83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5464",
                "uid": "0bfd177c-3b01-4ed2-a3a4-30d1fe145a44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5422",
                "uid": "d09d16e1-2b8d-4bad-961d-62be7be30313"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5830",
                "uid": "b95664c6-7b97-436e-af23-bd286dca14f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5993",
                "uid": "4bda0d48-7863-4853-a813-f46068ad4327"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6304",
                "uid": "a1d9ae88-01fd-46ae-9e9d-b91541865c39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "723",
                "uid": "f1ef5587-2c67-4060-855a-73ffc1c11b62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3962",
                "uid": "36863d10-a683-485c-b37f-68e4e5e94f0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3983",
                "uid": "a2eea67e-687b-4462-b8eb-12589030e645"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3982",
                "uid": "ef3699e2-8f7d-40e5-81bf-e352764f2e44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6161",
                "uid": "d8a9d08a-e1cc-4dcd-836f-d776c83eb78d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4723",
                "uid": "8da16faf-0f71-41b2-bfcd-77014e3781f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4687",
                "uid": "f07660cd-a6a2-4c5b-b7e7-20e27a32fd60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5306",
                "uid": "a0e0e902-9947-4268-8406-1ca65c6ac63c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5210",
                "uid": "21b9eb21-b05f-4d19-a53a-0266af68c5e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5702",
                "uid": "f2f0a443-b0a5-4831-a1aa-f024b5fb9bbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4922",
                "uid": "583f0e52-0f11-4009-a66e-5f2bf8002d91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5456",
                "uid": "2d721bd1-d1d9-407b-8ad8-bca16e76f7d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5379",
                "uid": "36026f8a-a331-4f26-ae99-c62fb8524a02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5698",
                "uid": "5bdffff1-686e-4463-8f76-4f190f68516a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5801",
                "uid": "8f1dcf1d-6cda-4f6c-a698-f2aa3a503f05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:23Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6276",
                "uid": "8bcc2442-3b48-48d9-93b8-9bc2537050c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3942",
                "uid": "1e40554c-3636-4bc0-8e39-7f540a23e7c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3952",
                "uid": "8bdbb0cc-6457-410b-a7f9-41f1c74c2546"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3951",
                "uid": "34af548c-3621-4419-b417-e5cc9fbf5f08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6015",
                "uid": "e0d05877-afb0-4844-a1ac-9dd421793e88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "4772",
                "uid": "0cb4de8a-9d4d-4d7d-a394-3ce3b62bffca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "4785",
                "uid": "939d4939-3779-409b-90ae-9e0f7997c908"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5232",
                "uid": "b6543951-e7d4-4171-9569-83827bd3c01d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5184",
                "uid": "9419f237-63f2-4e87-ba6f-8dfd74524e7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5585",
                "uid": "720d744c-557b-4bab-a1a6-cf0f50326a21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5068",
                "uid": "c42b8ed5-158a-433c-8a2f-fc73d71e9f14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5416",
                "uid": "7c18e387-8cc9-40cf-919e-b5fa19afda24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5391",
                "uid": "ceff07d0-febd-439a-8418-1d16b8f932d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5762",
                "uid": "f15fba8e-cad0-4195-8a11-c257491ee399"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5944",
                "uid": "9df79c30-7a3f-4153-8f5f-d138a69a0d1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6156",
                "uid": "308eba8d-f260-476f-88d1-356413301159"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3984",
                "uid": "e6fa9b67-a50a-43f0-acca-db8179ca33a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3994",
                "uid": "e5e17155-4d6c-4c20-9193-68f843ad1bfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3993",
                "uid": "f7da8a6c-0e4c-4761-9be6-3b9d88a5020c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:43Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9589",
                "uid": "18ae639d-1205-409c-b5ea-5031c670887d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9168",
                "uid": "e97197d8-4578-4469-9372-bc6526e11869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:52Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9800",
                "uid": "0462407b-8b7d-47d6-a56a-4690c8a600fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9208",
                "uid": "60642c8d-d598-40dd-98ec-ea8ca21cdf8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:54Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9874",
                "uid": "78d5edd4-9d15-4f11-9e7f-a54b7732fd69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:43Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9583",
                "uid": "e550a7da-2228-4d74-9b9f-3c448358c86c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9435",
                "uid": "f6a926c4-1dd4-4e96-9ce4-5ae21d48ffb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:35Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9349",
                "uid": "bfdd8c1e-4fd3-43b2-a8be-8579a9ea0016"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10404",
                "uid": "223cff33-a557-420d-828e-c3f397a29009"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:59Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10431",
                "uid": "411a0bc2-a616-4f1a-8553-29c0d85eb4cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:49Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9727",
                "uid": "ffe49c0a-588b-48ff-9150-47e954edf9f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:47Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9673",
                "uid": "33c1467a-4c4f-49a8-aa07-aee12a0b7378"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:31Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9190",
                "uid": "8889b765-f4a6-4ae1-9efa-5d6f16247a6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:31Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9180",
                "uid": "82dee132-7288-4972-8cab-3ae793d81fb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:31Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9179",
                "uid": "963d18df-a82b-44b1-aedb-ea9508902a82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6223",
                "uid": "6f453efd-8f33-4c54-b2d3-49c3e4e39415"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6225",
                "uid": "a0bbe2b1-481e-410f-830b-025ebcaec283"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6756",
                "uid": "cf329888-7714-48b1-8049-f0a7b3103981"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6476",
                "uid": "7840107b-91f3-4624-a418-69dfbe58cc9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6445",
                "uid": "dac57fee-5c47-41d7-b679-1fb8ad6ae032"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6608",
                "uid": "ab52c180-6e7d-4db4-a683-450baf2a2f56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6560",
                "uid": "4c13f564-e6e6-4df2-abbc-0316c27c75a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:53Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6686",
                "uid": "f353e9ee-dee7-4bf1-82f9-f89e7b16e6b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6532",
                "uid": "e6f2be52-62b4-494e-aa2f-0e9e9075e2eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6692",
                "uid": "aaa37cd3-b03e-4690-aae0-6b2b324d1fff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6591",
                "uid": "17328ac6-b23b-4355-8b88-8d3f087420e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6718",
                "uid": "112be4e5-0a9e-4c9e-82fb-6d03bc87369c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6753",
                "uid": "4b7ab54e-c549-488b-872c-4ff6c1761d7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:07Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6774",
                "uid": "44d2cf07-f04b-43b4-a060-cfe802492098"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "openshift-logging-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6228",
                "uid": "880bb3b1-6aac-4259-bce9-6ecf89ee00ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "openshift-logging:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6231",
                "uid": "7d321f31-92ae-46e7-a3b4-54cc5209bc14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "system:deployers",
                "namespace": "openshift-logging",
                "resourceVersion": "6222",
                "uid": "202fd8ee-a2b6-474a-af2e-3617921ff4c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "system:image-builders",
                "namespace": "openshift-logging",
                "resourceVersion": "6221",
                "uid": "437f8639-ddf3-452f-8b77-3e9f5ccb1158"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "system:image-pullers",
                "namespace": "openshift-logging",
                "resourceVersion": "6216",
                "uid": "a64dae2a-ea45-4bd5-be90-17363ce9d9a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6186",
                "uid": "1ce9190f-e7f5-46f3-83da-2a376e5b6153"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4688",
                "uid": "39c9c765-1066-45c9-ba35-515e6588d557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4791",
                "uid": "33b11bbb-54f7-43ec-a0b5-e2b56df06435"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5281",
                "uid": "5700bce3-a4b2-44bc-a57c-75197dcb88d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5156",
                "uid": "184f05dc-8d76-4af9-92da-06fc1fcc6cd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5674",
                "uid": "c11a7b66-2a88-43fd-915a-3241c986857d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4924",
                "uid": "821ebaf4-6298-4112-b6cb-5178c45a8282"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5426",
                "uid": "386c9ce5-e473-4599-a51d-170a0c3a65dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5412",
                "uid": "70ef5e99-f424-4d06-b02f-8adcb9ec4f7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5667",
                "uid": "631935aa-51eb-410e-aac0-df93f0660824"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:10Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5856",
                "uid": "144f59c8-874a-49db-a215-b4acd7d8fb0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6182",
                "uid": "e1f5348d-b279-4cc1-b871-3f1d31da3f11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:15Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1105",
                "uid": "ba7e85e9-9465-4309-8c2c-96e4f3482577"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:07Z",
                "name": "cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "782",
                "uid": "5b169d9c-72dc-4eed-b2f6-bca41ef135ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:16Z",
                "name": "prometheus-k8s-cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1133",
                "uid": "d79e9fb8-5ae5-4493-8968-1f004545bbaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4008",
                "uid": "42471d3a-c61d-49f8-9285-397cf2b2f4e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4017",
                "uid": "502432e6-249c-43f9-8b9f-f8dafcadf740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4018",
                "uid": "a929b78b-74a0-4952-bb9b-3b12f6be0ae2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5997",
                "uid": "d3c4bbf9-4c04-45d1-bb03-329e3bece124"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4832",
                "uid": "0d417bde-c822-4b02-9b28-78a1a73d68d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4715",
                "uid": "73949f73-c2b7-43af-a4fa-a4e4ded678b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5141",
                "uid": "cced601e-2599-4be1-8b88-b03f06661608"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5186",
                "uid": "176f6aa5-af23-4f7c-b093-2a60448f3deb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5766",
                "uid": "cafac94c-f62b-4022-9bd5-29690eb41696"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4999",
                "uid": "7cc3e147-1c10-41e8-90b8-98fde04e683e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5383",
                "uid": "9f6263fc-43f4-46cb-a7a0-cb53568fd427"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5394",
                "uid": "548fb6ba-e63c-41a5-8f17-fea17f57c040"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5716",
                "uid": "35d9add7-75f9-4168-bf82-79c144ab83eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5785",
                "uid": "bfb4bafe-e69b-4c66-a803-4aed37ee0202"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6220",
                "uid": "1cbe1d72-a2fe-4df3-951c-2703f3b7430e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "986",
                "uid": "8746b2a8-2e5f-4794-9aab-a6606f18424e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4028",
                "uid": "535e0403-3cb4-4993-b5dd-b018b7170a89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4037",
                "uid": "67b51a57-3917-4bdb-8d70-323fdc763a7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4038",
                "uid": "af64c018-46eb-469a-8101-47a24c6a6cf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:09Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a",
                        "uid": "165540e8-3bab-4daf-a416-91c19c0ba9ae"
                    }
                ],
                "resourceVersion": "14743",
                "uid": "71749028-3732-4b1c-a1ee-f2fa69ef01a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:09Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "30e1fee4a656579f055e90bd50374338b32290af440ed32e709fbffaafe5868",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "30e1fee4a656579f055e90bd50374338b32290af440ed32e709fbffaafe5868",
                        "uid": "f2c9b1a7-7abf-4115-89ff-4f99ce75d6f3"
                    }
                ],
                "resourceVersion": "14733",
                "uid": "566d3a30-435d-4cec-a4bb-7208ec60df80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "30e1fee4a656579f055e90bd50374338b32290af440ed32e709fbffaafe5868"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:02Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1",
                        "uid": "06f0c9d7-af66-4284-b0a6-f9df04801933"
                    }
                ],
                "resourceVersion": "14540",
                "uid": "33e4b6a0-1e34-4d75-94e3-e7279ca4decf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:02Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "925ad1f05bf386dc21bdfe2f8249c1fbfd04a404dec7a7fb6362d758e56eb0c",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "925ad1f05bf386dc21bdfe2f8249c1fbfd04a404dec7a7fb6362d758e56eb0c",
                        "uid": "9244522b-35d2-4b66-9bec-59ffab2c4525"
                    }
                ],
                "resourceVersion": "14530",
                "uid": "dfdf431d-77ac-4666-987f-94cd72fc129e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "925ad1f05bf386dc21bdfe2f8249c1fbfd04a404dec7a7fb6362d758e56eb0c"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9",
                        "uid": "c5a9142e-6b64-4cf2-bf22-2476aa95a2d1"
                    }
                ],
                "resourceVersion": "14688",
                "uid": "b904043b-d38b-4e7c-9eca-5d1d44bf09f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6133",
                "uid": "32ef2e68-5efe-45c4-bbf4-ae00b1b09dd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4706",
                "uid": "388510c0-9428-426e-8fe1-c60cba96b215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4759",
                "uid": "3a727b67-b681-4e3e-8875-27b3c273adc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5200",
                "uid": "b4bac890-9883-4409-ab25-c4aec53d3bf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5107",
                "uid": "ba6ec4b3-d935-4912-b875-1f140faaffed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5734",
                "uid": "9aa729f3-c8e5-4781-b4eb-024afe31a87b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5022",
                "uid": "09dc8ada-ee5e-4013-82d8-38b4300b256d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5440",
                "uid": "37e10f6a-1ac8-4049-ac86-22a73de418ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5335",
                "uid": "59a6cef8-651b-40a8-85bb-d13f3b256747"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5786",
                "uid": "07862819-217f-432b-b9cd-e85848eeba1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5996",
                "uid": "15604ec4-f3c5-430c-a709-8ec13aa53f4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6236",
                "uid": "d5f6687e-a6ad-4e0e-93ef-c9724926148e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "dedicated-admins-openshift-marketplace",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6309",
                "uid": "d83774c9-ce6e-4df9-a374-6b150b26a4e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-marketplace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "f79378b9836da0a180436b794e6453783590867ba696f35668b1ac45687ad88",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "f79378b9836da0a180436b794e6453783590867ba696f35668b1ac45687ad88",
                        "uid": "3a66d521-feb5-4318-ba53-7706c0d75b45"
                    }
                ],
                "resourceVersion": "14615",
                "uid": "f4b5e08e-aaa2-4c83-a072-2373134269c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "f79378b9836da0a180436b794e6453783590867ba696f35668b1ac45687ad88"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4048",
                "uid": "e07bc1d6-aa4a-45ee-ab2b-31e00606598c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4101",
                "uid": "8276c9d2-3034-4efe-9604-0dabb070aabe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4141",
                "uid": "8cfcb0c6-6131-488f-8cd0-9da48218f0f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheusk8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11036",
                "uid": "e9e61c10-a67c-4b66-b6d1-1fbf7a2b2072"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-cee",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5273",
                "uid": "b88ec734-e743-4911-8483-b574dd42d2a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6073",
                "uid": "c5ca810d-7dd6-44b4-96d4-41e6c9d5f608"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4808",
                "uid": "49f538c7-80af-4af9-bd57-4e4f47fc8ebf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4846",
                "uid": "a84a21e2-6a26-4f56-b108-4a58d12ffd72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "backplane-lpsre",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4965",
                "uid": "573e72c6-dd4c-46b6-8869-f1fdc348d169"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5213",
                "uid": "e19d8e4a-ee08-4e71-b312-5cb10f67e9f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5123",
                "uid": "54bd9110-0f33-45ab-8fc2-0560ada49b3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "backplane-mcs-tier-two",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4882",
                "uid": "a2771fc1-0cab-4586-8931-bd3acd6d4c41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5732",
                "uid": "f39b0d56-c330-4ddf-8a92-4ad75d1c6792"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:32Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4913",
                "uid": "9e6ad33d-9556-4d62-8163-5570881fb74d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5397",
                "uid": "c042db25-116b-4596-8011-397773a1dbec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5360",
                "uid": "6b3c22f9-f41b-4fb9-8655-721fc7b4a72c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5670",
                "uid": "b9c63b7c-b54d-4658-9c60-8cc6c7ca0e78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6032",
                "uid": "9f05dde6-d8f1-4c75-bbd6-57e755e80c73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6184",
                "uid": "a4eaa774-19b1-443d-985d-b58157f3cd36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:23Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1666",
                "uid": "e466b8c7-accb-48b4-b5d8-ef8abfc1c9b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:24Z",
                "name": "cluster-monitoring-operator-alert-customization",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1769",
                "uid": "d5c42b54-7a99-46a3-a62b-2f968c8bf915"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-monitoring-operator-alert-customization"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:30Z",
                "name": "console-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2192",
                "uid": "150d3cdc-df19-4f68-85b7-68b11f53e11e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "dedicated-admins-hostedcluster-uwm",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6237",
                "uid": "264ed4ce-9b54-4854-bedf-615ba8def066"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-hostedcluster-uwm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "name": "insights-operator-alertmanager",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1457",
                "uid": "49cf81c9-e433-475b-83a1-7e7f529f4dfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:13Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.7.3"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11082",
                "uid": "a23ce778-bc5f-4f9d-b71f-cdadcb742b57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:13Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.7.3"
                },
                "name": "prometheus-k8s-config",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11085",
                "uid": "c6528c33-6604-4bac-ae2e-cef9535f1342"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:58:33Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tsf-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tsf-tas",
                "namespace": "openshift-monitoring",
                "resourceVersion": "20768",
                "uid": "92215dfe-1f02-425d-8ca1-7f3887c96081"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-segment-backup-job-tsf-tas"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4184",
                "uid": "86cbd772-09ef-4976-ae98-95c664d11084"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4214",
                "uid": "95f47bcb-5449-41bb-b610-365d6f6729e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4213",
                "uid": "3f89dd63-d096-4870-b04a-c389a3bed7a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6085",
                "uid": "24bad315-0a6a-4a2c-889a-383eea6e4378"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4799",
                "uid": "9b69b36f-f520-43f1-bf9d-800e1925f9a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4800",
                "uid": "5492b37e-6da0-4921-b2df-e9dcfd065f82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5238",
                "uid": "7541db4b-0193-4ba7-8739-ca7322faf279"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5050",
                "uid": "249c6b91-d01a-4adb-a2a5-45f819622fbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5654",
                "uid": "981e0514-9a54-4788-ba50-f20cbe52b6ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4932",
                "uid": "18bb457f-d5ba-4366-8671-83305c14a43d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5348",
                "uid": "9139812d-8417-41a6-bace-d051ce74834e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5458",
                "uid": "beaa4113-d73c-4b7b-b03f-b7e842b24c55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5672",
                "uid": "2febaa9d-2eae-471f-acb7-5b3d0d93a826"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5980",
                "uid": "08ee46e2-a71e-4e9f-8ac7-ef410af0859b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6296",
                "uid": "bff8f5c9-18a7-4a32-bd77-2bc2987e3bba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:43Z",
                "name": "multus-whereabouts",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2592",
                "uid": "5e8f6810-47e8-4951-b7d2-0f261913258f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:46Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2646",
                "uid": "ae34b48e-3fc0-4952-8e65-9f322c0daa9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-multus",
                "resourceVersion": "4215",
                "uid": "b3b94256-3510-4bd5-be19-8c7f1f0da1d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-multus",
                "resourceVersion": "4240",
                "uid": "c19d26ea-1173-44b0-89ec-c26bf3df54a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-multus",
                "resourceVersion": "4241",
                "uid": "022ffeb3-8f7f-4078-b175-3a486ef9e236"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6762",
                "uid": "02bdf4c0-1c5f-4628-9a8a-b71fc4fb0e99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:42Z",
                "name": "backplane-cee-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6565",
                "uid": "632ef7e9-949c-42dc-9482-5e14258acaa2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6772",
                "uid": "6aad8903-ed63-4d99-871e-7ad6804d894e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6443",
                "uid": "9df508da-8ad4-4199-8838-0c1e7f7e28e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:49Z",
                "name": "backplane-csm-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6620",
                "uid": "a20f2712-8de8-43ff-aa71-65a50ba908db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6582",
                "uid": "9da0e0a5-cc95-4ef8-8461-42f3ed66fb5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:37Z",
                "name": "backplane-lpsre-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6515",
                "uid": "9426ccbd-9da5-4abc-9be2-2d6e43b4844c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6529",
                "uid": "50587496-652d-4410-b3fd-911870764eb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:52Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6675",
                "uid": "ac2cdfea-d8fd-4d65-9eec-ce9dfc6e3b44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:35Z",
                "name": "backplane-mcs-tier-two-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6492",
                "uid": "5ad75254-8c2b-4333-8a79-63ddf6377abf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6514",
                "uid": "69b59afb-c349-4fe7-8039-e6d8e2bc1476"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:10Z",
                "name": "backplane-mobb-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6788",
                "uid": "64257734-578b-4d9f-868c-56aca9469146"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6629",
                "uid": "1449faec-f15a-4386-9686-d957a1193b9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6588",
                "uid": "2eca7127-2d62-4aeb-8cb5-99bfd4ab039c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:35Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6498",
                "uid": "3a71ce83-ba65-427a-8afe-c92201fbfa28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:59Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6727",
                "uid": "f6e7c1ce-d280-4ac5-8cdd-9daa6005e159"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6748",
                "uid": "808539a8-4252-48f3-9882-3e0e4002f10a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6758",
                "uid": "bbe9318f-89d5-423d-9992-3b4b2d821184"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:47:09Z",
                "name": "backplane-tam-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6783",
                "uid": "a4a660a1-27e5-4557-861f-d453eaaa376b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "system:deployers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6431",
                "uid": "dd797ae7-a9f2-45b6-b7ce-1d573a9663d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "system:image-builders",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6429",
                "uid": "b886e1a7-63b8-4fc3-a271-e039fefc124a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:46:29Z",
                "name": "system:image-pullers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6430",
                "uid": "840749ad-4cf0-4f94-af76-af5fb4d02fe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6086",
                "uid": "2a2dd27c-a060-4c50-8804-16c2abbada9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4836",
                "uid": "d36230e9-3dbb-4bdc-922c-77bae0fc7f87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4690",
                "uid": "cfd3c558-9810-4658-8329-4634aeb38baa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5282",
                "uid": "199aa941-e5b2-4413-a770-0ebc01c8f44d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5110",
                "uid": "281389f8-94c2-4543-b1b7-c542d19ee236"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5677",
                "uid": "ab89e86a-8e05-4824-a197-3ec4b9a403a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5006",
                "uid": "59788e5a-84f1-407e-aff3-4c77fb753433"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5459",
                "uid": "00271615-2060-4ace-9c64-e89c1052296c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5417",
                "uid": "1951e384-ca24-44e9-94eb-478aede8f241"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5719",
                "uid": "cbd4741a-dff9-4159-ac26-4e995e6b9c99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6050",
                "uid": "b97ff97e-26fd-49d5-85b4-4f4fcba2268b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6354",
                "uid": "88e5b3d8-89d7-4819-a9ef-dbb0f652afe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:deployers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4507",
                "uid": "0a3f34e0-27e6-49db-9423-529e4425e5f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-console",
                "resourceVersion": "4516",
                "uid": "53c272c8-5e86-468e-8980-12b211443f7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4515",
                "uid": "3057fc60-1ef0-4a5d-a70e-bc1b47803d90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6166",
                "uid": "33479e5b-84cf-48f1-a422-a47b5581299b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4766",
                "uid": "13a29ccb-4c44-4cd1-a70d-239c2c65d26f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4824",
                "uid": "5427e7f6-224a-454b-ae28-312911f6fc5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5245",
                "uid": "d0bc030d-10e5-46de-b574-6872c7df5f5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5091",
                "uid": "4bfc781c-6ddc-4675-a5d9-d9ae7df4096e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5623",
                "uid": "facaa7b9-2b47-403b-bf28-b4a82b52504d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5124",
                "uid": "8168dec3-02f3-40ec-92d3-bca6ce325b12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5400",
                "uid": "46294a01-f27b-4db7-9527-373a462c569a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5425",
                "uid": "9ecf860a-5db2-4e08-9f6b-e0690b0c271d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5815",
                "uid": "16fed41a-64bf-4aa0-af32-ce3992205288"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6035",
                "uid": "1fbb0687-f8f4-4ed0-bd49-aeb515866896"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6299",
                "uid": "806f0b00-e064-4723-91e6-e65bea29d621"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:56Z",
                "name": "network-diagnostics",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "3000",
                "uid": "33f20957-1b05-4a31-a77a-879b1033a08f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:58Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "3037",
                "uid": "03d65e0f-747e-49d8-9816-768c3cc2069b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4478",
                "uid": "72766fab-d638-404f-9d23-a589c05066c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4490",
                "uid": "45f644f8-a856-4c19-b70e-e3abc24b49e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4480",
                "uid": "293c0649-d3a2-448b-bafc-c876956be3d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5992",
                "uid": "9b56579f-76b7-4849-8d15-f04ec7a015f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4838",
                "uid": "5fe21ca2-1691-4e9e-b103-c9d084cb80bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4881",
                "uid": "152cf695-b6bc-4cb3-b626-79e357be3f48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5216",
                "uid": "93cd8148-8d2b-4f1f-a71a-a93f10172c34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5095",
                "uid": "9141ff14-d254-4518-a4e4-d4cfa2a0598d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5735",
                "uid": "02dc337f-d848-490d-915a-9edd70ec8e0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4927",
                "uid": "aaa1aefc-c6f5-4540-b508-7cdd5b76e62f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5328",
                "uid": "b44a4131-4d10-4d76-b7d8-c069ff9353a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5342",
                "uid": "e7e67293-0a24-4d45-8c45-708e85c0de9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5746",
                "uid": "c378f8f5-5999-417b-baa2-4d4835f47d7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6037",
                "uid": "568347f4-5c61-44c1-b310-d7b1a305df77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6305",
                "uid": "4b99764b-f3cf-44e7-9f53-1c1002ee1739"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:00Z",
                "name": "network-node-identity-leases",
                "namespace": "openshift-network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "3442",
                "uid": "34c39158-bb6e-4862-a4c0-d7aa78851326"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-node-identity-leases"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:deployers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4494",
                "uid": "de53d70a-29cf-4bc9-b2eb-2389b2e54373"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4504",
                "uid": "abeae713-4f5b-432b-971b-118b6a2400fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:08Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4503",
                "uid": "fb5688d1-ba93-4c14-9096-8a43fc9d0279"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6176",
                "uid": "f1046427-158f-4b64-8ba6-eab52c176ebe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4707",
                "uid": "d5eb4860-2696-4fcb-b1ac-1af419abf3f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4786",
                "uid": "b6581ae1-6371-4e9b-a165-18ad7c7b01fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5155",
                "uid": "3ae50ef3-942c-4fa0-b074-26ad566e77ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5073",
                "uid": "240f1945-6898-416c-af86-4c7bca13d213"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5664",
                "uid": "ea0d8ee3-b308-4ce2-b763-e7fecdaca463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5099",
                "uid": "a0345896-4f1b-405d-a0f0-61309c6c2eaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:49Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5353",
                "uid": "9bdf84ab-d2a8-4d54-8452-18b290f8092e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5460",
                "uid": "d3e39298-c835-48fe-87ae-5f4ba850c268"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5816",
                "uid": "405d567d-80c0-46f0-9c03-005bb178089e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5838",
                "uid": "97f44a1a-142d-43dd-991f-f164e081f264"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6340",
                "uid": "3c07a7a9-22a6-406e-b77b-30318927c957"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1446",
                "uid": "3cb81d86-0e06-4026-ada4-51481ba2db72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4273",
                "uid": "49406324-d701-49af-a4e7-d4dce43b2575"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4300",
                "uid": "30b1f1c3-82d2-4389-9364-ee42916ffa4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4272",
                "uid": "12981146-e8e0-4526-817a-012d73d86b34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-node",
                "resourceVersion": "6177",
                "uid": "a3128683-7925-4ea2-ab6e-e9355dbf5b3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-node",
                "resourceVersion": "4845",
                "uid": "e9145726-868c-485b-a3fc-abc54a7dade1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-node",
                "resourceVersion": "4773",
                "uid": "ec5a08ea-f930-4b3c-8535-828c1ad5d093"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-node",
                "resourceVersion": "5178",
                "uid": "60227009-38de-4582-96ea-08a73c2e5312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-node",
                "resourceVersion": "5190",
                "uid": "b4379ebc-80b3-48c0-9909-02714878595f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-node",
                "resourceVersion": "5768",
                "uid": "915cb1a3-4cba-4623-b4fc-5c7cfad3b4eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-node",
                "resourceVersion": "5080",
                "uid": "51cd2998-2475-4531-a29d-fa2c58e32591"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-node",
                "resourceVersion": "5331",
                "uid": "633ee9cb-ec5c-4a03-9cc4-8a36b5db0b60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:52Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-node",
                "resourceVersion": "5404",
                "uid": "295aa7cd-d904-474d-9197-f50a12d69f12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-node",
                "resourceVersion": "5765",
                "uid": "1038fd71-2fa9-49d0-84e1-45257a878cbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-node",
                "resourceVersion": "5772",
                "uid": "cf606df2-982f-4a72-ace5-60a6f747b685"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-node",
                "resourceVersion": "6280",
                "uid": "79a4123b-63b0-462a-9ded-6939b1984073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-node",
                "resourceVersion": "4299",
                "uid": "85e46d7f-2d65-4bdf-9463-4d3476b69fde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-node",
                "resourceVersion": "4324",
                "uid": "97a14844-00d9-4d68-ab91-beabb7fc8d2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-node",
                "resourceVersion": "4301",
                "uid": "355f3cc7-8823-4a4c-b487-f7abfd099cb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:36Z",
                "name": "system:node-config-reader",
                "namespace": "openshift-node",
                "resourceVersion": "425",
                "uid": "d19a8cb5-75a1-47bd-aae0-7f828d58b206"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:node-config-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6044",
                "uid": "6ab4fd2d-e418-432f-9afb-f2ef1b4beb91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4809",
                "uid": "cfdc4e2e-cb8e-438a-a457-8447739a835c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4712",
                "uid": "ae5e520e-166f-4529-826e-dfca8da56e97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5308",
                "uid": "e17bb7ca-afdd-4a45-9302-ad6b55c4e8e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5168",
                "uid": "51895159-e9c9-44e5-8345-4cf237760289"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5625",
                "uid": "d9b6f922-39f8-413d-a848-59f1558e666a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5011",
                "uid": "d961d4f4-559a-4400-98c4-2e24f3d57514"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5388",
                "uid": "b82eaec6-e3aa-4297-94ee-b823d763face"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5434",
                "uid": "7df450d2-c1b3-4f49-ba43-626547a03a8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5737",
                "uid": "4ca901d4-a9e1-45e5-b960-77b6b727291e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5781",
                "uid": "b5deff65-be58-4d11-b6d9-92aa4fea443e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6195",
                "uid": "5bdb194d-4e9e-4fd1-96fb-f09a57eea0ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4341",
                "uid": "aaea8c61-1213-4069-90fb-bd79b66f1c7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4358",
                "uid": "34bf7ea4-5987-4898-a9a7-e1d771f0b658"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4342",
                "uid": "2e5b2788-3bb0-4910-962a-43c751c4eeb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5617",
                "uid": "e48107ef-8986-4ad8-9e5c-043854c1027a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5620",
                "uid": "3ce273fd-5382-4253-a995-d2b575b000af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5995",
                "uid": "27e74705-d77a-486c-8039-fde313d66eb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:35Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6487",
                "uid": "ce6bf00d-a09c-4525-b147-b8584737b9cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:32Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6455",
                "uid": "c369953e-2a47-423b-b966-4c56e9293d48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:45Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6592",
                "uid": "41709aae-14ee-48f1-a9f2-104ba081d0e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6536",
                "uid": "ecd07d93-c3f9-49d5-8423-8d39ca759010"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:53Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6687",
                "uid": "0e2d0725-e90d-4394-bee2-a46f6b7ff47f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6535",
                "uid": "2ccebfeb-4413-48e0-8fbf-d2208b69216b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6679",
                "uid": "3328c6fa-730c-446d-99d5-131e1635daf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:44Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6583",
                "uid": "fb8b300b-bf1e-42a9-a137-456c41736299"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5700",
                "uid": "67c91602-4a31-4341-b06d-022112fc1534"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5787",
                "uid": "0e0ece72-b0f5-448d-ab3e-c280f57b2015"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6342",
                "uid": "203fa3b7-2abf-4cc6-9d2e-66d2b4ec7d72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6404",
                "uid": "2cf95a0d-4391-4626-a9be-1ab818ac284f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6409",
                "uid": "cf389185-6d09-4aa3-b205-7fd22bb36ab0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6370",
                "uid": "f126b257-136e-46a7-956f-35225f833d40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6377",
                "uid": "89e377b9-d6de-4686-bab8-9881dd399834"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "openshift-operators-redhat-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5624",
                "uid": "4769e082-1b32-46a5-848e-6b9144c05877"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:00Z",
                "name": "openshift-operators-redhat:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5627",
                "uid": "031b6dde-66fd-4330-8fd8-aaef87bfacbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "system:deployers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5616",
                "uid": "56d330b2-de18-45b3-a8c8-beb89723f003"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5614",
                "uid": "b7acbb57-6dd0-4191-934f-1cab52053cda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5613",
                "uid": "1ff59baa-63a5-44a8-b5c1-591f9b67f7cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6190",
                "uid": "e849c84d-cb22-42bc-b588-6013c0a0fb72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators",
                "resourceVersion": "4819",
                "uid": "995bbf9f-61b7-49ee-bacc-036a4c91f1f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators",
                "resourceVersion": "4792",
                "uid": "7c5688f6-c459-41dc-bc44-976d88e9d63d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5293",
                "uid": "40c731cf-ead7-4362-90e2-e7d54b529668"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5074",
                "uid": "94054336-b745-40b0-a31b-44924d769bc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5679",
                "uid": "6ed82a8d-798f-4cc7-80d1-666f9bc1eda6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5102",
                "uid": "e19ec573-c915-4dba-a57d-8c6c38e0b1b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5356",
                "uid": "4fd3bcac-fef1-4c61-887b-018319985eee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5427",
                "uid": "7960e092-5bc2-490c-9b08-46d897909729"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5686",
                "uid": "b467418b-2e94-48e7-9e24-38dc8c2bffab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5803",
                "uid": "78ba8c3c-7a29-4cb4-808b-f1b7b63d5485"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6187",
                "uid": "25370266-a633-4c29-9952-c16b9416bbc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6401",
                "uid": "fb413fba-19f0-484c-82a6-3d33fd8ce986"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6405",
                "uid": "69d0c21e-9dac-4d0a-a4d1-7c4620a6779d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:27Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6355",
                "uid": "29e7c13e-c486-499e-a2e0-205ec4eae073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6374",
                "uid": "520b320c-bd2c-45f7-8d89-28750eddec5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:24Z",
                "name": "dedicated-admins-openshift-operators",
                "namespace": "openshift-operators",
                "resourceVersion": "6303",
                "uid": "dba3061a-09f2-43d8-87ee-ddbf3ac779b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-operators"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:29Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-prometheus-k8s-read-binding",
                "namespace": "openshift-operators",
                "resourceVersion": "15689",
                "uid": "3cbbe615-acab-424e-83b6-3115e14c6c7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:27Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-rh.v1.20.3",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-pipelines-operator-rh.v1.20.3",
                        "uid": "c9cc45cf-40e7-4cbb-ba37-9b1e5389c09d"
                    }
                ],
                "resourceVersion": "15598",
                "uid": "bad26aae-1ff8-4317-8627-474a5dc9755a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-rh.v1.20.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:36Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtas-operator.v1.3.3",
                        "uid": "8b469ddd-b639-40ef-a97a-a82838621fb6"
                    }
                ],
                "resourceVersion": "16470",
                "uid": "9d91934a-3fc5-4c71-8311-268e4512253e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:41Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "9G792iSQXWwzUWZgReGQ9WUSeYqsIjvOU7RX34",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.3-rht-upHYtGeVuJ346395fnICIw1hq6AjqiEcjS5u9",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtas-operator.v1.3.3",
                        "uid": "3963783e-3109-4d44-9756-035456897145"
                    }
                ],
                "resourceVersion": "18537",
                "uid": "b4bbeec8-c627-4022-a018-2f4afd082bd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.3-rht-upHYtGeVuJ346395fnICIw1hq6AjqiEcjS5u9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-operators",
                "resourceVersion": "4374",
                "uid": "705ae288-85dd-4391-aa43-eb1e74d47545"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators",
                "resourceVersion": "4393",
                "uid": "408becd4-82e8-4602-97ba-8356105dc232"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators",
                "resourceVersion": "4375",
                "uid": "f67e7a07-55c0-445f-851b-fd245db0af8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "olm.managed": "true"
                },
                "name": "tekton-operator-info",
                "namespace": "openshift-operators",
                "resourceVersion": "15978",
                "uid": "fd57c44d-e8a6-4f0d-a8e2-7b7cad105a93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6144",
                "uid": "fbc6211b-495d-44ef-8d98-df5f6f0a125b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4787",
                "uid": "7615042b-82f5-404e-95d5-ea9109695e52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4737",
                "uid": "f28bdf1a-395b-4bb1-9169-6418fa95f762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5159",
                "uid": "795e2297-9b53-46b3-89d9-4ef281b04f41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5114",
                "uid": "44b69220-4f5a-4ddf-986e-3ebbdccaddc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5704",
                "uid": "a3310736-81de-40fb-a8e4-99a2e537f37b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4937",
                "uid": "f10ce1a0-52d3-4f28-a09e-8f9783a04c3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5466",
                "uid": "4fc0427f-a82d-43a6-8519-c38e9d77cfdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:48Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5326",
                "uid": "7261ed61-61e3-4ece-ab40-37b643ab8b0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5749",
                "uid": "7d261c7d-765f-4e7d-8442-0b7acecfd90e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6039",
                "uid": "b33e39e7-53d8-4691-9b40-dcc144781424"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6362",
                "uid": "7c78c308-8c05-4092-bfaf-b7b00617f27d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:52Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2888",
                "uid": "c0272891-9f50-41bd-9c12-fedc309cf8bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:50Z",
                "name": "openshift-ovn-kubernetes-nodes-identity-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2802",
                "uid": "d8a6e79c-5851-44e0-a9e6-2fd53fce447a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:55Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "7014b0ba-1294-4a75-8341-1d5269df2ad6"
                    }
                ],
                "resourceVersion": "2964",
                "uid": "cb0e23bc-f404-4991-9874-4c8db5b3e7d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4407",
                "uid": "eeef96f1-827d-4b6b-9c9a-965afa425599"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4406",
                "uid": "506b535d-f9dc-4044-995b-84d65a2c79f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4408",
                "uid": "d4296e45-9683-4328-b5ae-646b846cd8ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6146",
                "uid": "2a149042-c02f-4f17-a43d-e449f8a5f508"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:34Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6480",
                "uid": "e6d71a54-454a-4b1a-8c0c-7b2e5916329a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6451",
                "uid": "19e7224d-e912-46b2-b38f-c00e422ba389"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5180",
                "uid": "9f28f924-9d0b-4032-b1ac-95f702fa3e24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-lpsre-package-operator-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5035",
                "uid": "98eb8bef-ce46-4f21-9254-a55008aaa993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5127",
                "uid": "6f1ea21b-ba42-41bd-a45e-bdb76da98077"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5572",
                "uid": "5592258a-c84e-4bfc-9444-2f10168bb97a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6524",
                "uid": "51252da5-1544-4739-9b81-0e02881c6637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5428",
                "uid": "5682d9f5-62fe-4f44-bc8f-6d7526892ffe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5449",
                "uid": "88aa684f-8bca-435a-92f9-2c732a796715"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5727",
                "uid": "25aa724e-821c-4ed1-a134-89902d205c04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:11Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5919",
                "uid": "fc6f9a9b-3228-4a4b-9754-650358bd0c97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6169",
                "uid": "6810da19-c4de-4c25-8a23-a8cbc0f8774a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:deployers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4996",
                "uid": "e332b077-03ad-4761-aaf1-bcbc8e337fc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4997",
                "uid": "8c05eb7d-ed0d-439e-a13d-6eb68ae374af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4995",
                "uid": "f44fd259-33f9-4f44-a2c8-c7650c2d3911"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19209",
                "uid": "be494fc0-3a05-4181-ba30-111625f10e74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:51Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18029",
                "uid": "188e51ad-4bd1-44d1-b40b-8c289fb12716"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:58Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18492",
                "uid": "c7c0d388-1768-477c-8a25-2c9be598dc19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:05Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18999",
                "uid": "61e4f0eb-6655-4e2c-871b-84b377833c2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:14Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19179",
                "uid": "e5350692-d5ce-45d4-9ecb-4ecc30a1cb0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18618",
                "uid": "fc970480-336c-43b3-be31-efdc6fab58d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:55Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18194",
                "uid": "bce0234e-59ee-48e3-8696-f160a4bad8d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18940",
                "uid": "3435c24c-ea10-4712-9489-7a9c26d67530"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19168",
                "uid": "29f68043-5236-4922-871c-aa8e134a77e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19050",
                "uid": "e44a3e8a-6395-44ee-86f4-afd6bcdfaa99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:08Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19041",
                "uid": "4da40798-05c6-4aec-83d3-1905a3a737c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:57:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "19237",
                "uid": "d8d4299d-db11-49f1-9490-f51fd41e38c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d9e7b528ac93b9cb3ce00f4d9f97772d88225c46ca04bfabeb78db59a26c759a",
                    "operator.tekton.dev/preserve-rb-subject-namespace": "true"
                },
                "creationTimestamp": "2026-04-15T22:57:23Z",
                "name": "openshift-pipelines-prometheus-k8s-read-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-post-jjv9z",
                        "uid": "4ca19706-0796-4cb7-9ae6-eb872da23c01"
                    }
                ],
                "resourceVersion": "19303",
                "uid": "d6f7606a-7b83-4086-b5af-8285687ed1cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9227103bcec614170488346bb7ce228c664eba16d3412815d369a2d32bc533c4"
                },
                "creationTimestamp": "2026-04-15T22:58:54Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-fw4z8",
                        "uid": "6e0ea6ef-af0d-4e39-a514-fba4193a184d"
                    }
                ],
                "resourceVersion": "21449",
                "uid": "44ea904a-e7d7-42f4-b44c-5f3af51ee836"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7c6a329b79e3b48b380790bef6835878c0339ca01b69283007a56d6f7e8755c8"
                },
                "creationTimestamp": "2026-04-15T22:58:54Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-fw4z8",
                        "uid": "6e0ea6ef-af0d-4e39-a514-fba4193a184d"
                    }
                ],
                "resourceVersion": "21447",
                "uid": "33d5d002-4098-4868-9dd1-f2c09c8ec7dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7b6a7e2bd9cb8b68da29ef9b066b6e48876046597d4ea7d40065b0128923ccad"
                },
                "creationTimestamp": "2026-04-15T22:58:54Z",
                "name": "pipelines-as-code-monitoring",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-fw4z8",
                        "uid": "6e0ea6ef-af0d-4e39-a514-fba4193a184d"
                    }
                ],
                "resourceVersion": "21455",
                "uid": "7f2b6fc9-018d-4248-be7b-c7988b3dd19b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f8251ca29c928e89b2c3edda9aff1cd9d3fb8901092f2ffa5d3183828e2710c3"
                },
                "creationTimestamp": "2026-04-15T22:58:54Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-fw4z8",
                        "uid": "6e0ea6ef-af0d-4e39-a514-fba4193a184d"
                    }
                ],
                "resourceVersion": "21451",
                "uid": "d324d7cb-4498-43c3-b934-45dc6ffa21cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e316db247fef8d6009f67ca443b298a33fe7d82a627299a8b027d97e4660ac9b"
                },
                "creationTimestamp": "2026-04-15T22:58:54Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.37.7"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-fw4z8",
                        "uid": "6e0ea6ef-af0d-4e39-a514-fba4193a184d"
                    }
                ],
                "resourceVersion": "21452",
                "uid": "c9c22e00-c94f-4795-94bb-f6e628aec596"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:51Z",
                "name": "system:deployers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18042",
                "uid": "096e1088-b0a8-49cf-9bfa-5a2208bd4c9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:51Z",
                "name": "system:image-builders",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18043",
                "uid": "92583aa3-cd72-448e-ae93-3031ca5ce3e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:51Z",
                "name": "system:image-pullers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "18036",
                "uid": "a550b915-8c6c-4155-bc89-59b57352c997"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3eb739f8d740edbce14bda31a3b98bb356b56903112983b6e4f6c67d255d7fa7"
                },
                "creationTimestamp": "2026-04-15T22:57:45Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-mxgg7",
                        "uid": "2f287ba3-a3dd-4f58-9a38-4dc154fa4c67"
                    }
                ],
                "resourceVersion": "19847",
                "uid": "5bd5f4a9-ab09-4491-a866-87dda3726520"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c9ffc5697fb66e4279575e5d416c22ff88587282ac95a35c805422343e48fd68"
                },
                "creationTimestamp": "2026-04-15T22:57:45Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-mxgg7",
                        "uid": "2f287ba3-a3dd-4f58-9a38-4dc154fa4c67"
                    }
                ],
                "resourceVersion": "19851",
                "uid": "ede6ab5c-3e54-448f-b3d9-fa00af91249d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-konflux",
                    "meta.helm.sh/release-namespace": "konflux-ui"
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm"
                },
                "name": "tekton-chains-public-key-viewer",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23297",
                "uid": "9ef426ba-db2d-4895-8db9-cba898f9c183"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b0f9fd8d10b47a64e05fd2cf8a700db3416c1fabe98d27d8bf2d1a91baf94bd0"
                },
                "creationTimestamp": "2026-04-15T22:58:34Z",
                "name": "tekton-default-openshift-pipelines-view",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-hnrtp",
                        "uid": "50e2f7e3-26ea-4ba0-ad7f-8cd8f94d3eec"
                    }
                ],
                "resourceVersion": "20981",
                "uid": "2deed623-7193-43c2-87da-b81b98462031"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-default-openshift-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"6f16d444c6ac7af2af16c01c9f850c88458d5c985c031eab5b5bbad829c9aa5b\"},\"name\":\"tekton-ecosystem-stepaction-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolverstepactions-1.20-mk98w\",\"uid\":\"4bb01405-27d6-40f8-8fc9-18c75b19175f\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-stepaction-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "6f16d444c6ac7af2af16c01c9f850c88458d5c985c031eab5b5bbad829c9aa5b"
                },
                "creationTimestamp": "2026-04-15T22:58:31Z",
                "name": "tekton-ecosystem-stepaction-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolverstepactions-1.20-mk98w",
                        "uid": "4bb01405-27d6-40f8-8fc9-18c75b19175f"
                    }
                ],
                "resourceVersion": "21138",
                "uid": "e444b55b-e058-44b8-9a4a-cfebe27cdcb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-stepaction-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"38a92dc95cc17e5dcfaa69fb0d4bd3f88fc78e737a34bebb4ccd6e1eae11fa0b\"},\"name\":\"tekton-ecosystem-task-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolvertasks-1.20-6dlvt\",\"uid\":\"cfc2df79-c1ba-467a-90f1-d7568bb295cc\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-task-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "38a92dc95cc17e5dcfaa69fb0d4bd3f88fc78e737a34bebb4ccd6e1eae11fa0b"
                },
                "creationTimestamp": "2026-04-15T22:58:31Z",
                "name": "tekton-ecosystem-task-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolvertasks-1.20-6dlvt",
                        "uid": "cfc2df79-c1ba-467a-90f1-d7568bb295cc"
                    }
                ],
                "resourceVersion": "21130",
                "uid": "7f4d766b-9963-4935-b072-561757ed329c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-task-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2933b0f8670e8a77b27420b95ec73428cea7563baa1d5c3550a8a87974407157"
                },
                "creationTimestamp": "2026-04-15T22:57:04Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18857",
                "uid": "4de8461b-4d94-4154-8f6d-7dfbfc465efe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "88ce77015b308e9637580b5276bd3f6b13e5aabcc7b00b443550f4ffed112220"
                },
                "creationTimestamp": "2026-04-15T22:57:04Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18873",
                "uid": "1209e502-8d65-41af-9b7e-a92219295823"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "8b9a4f9087883af37f95914046ce7842a0e28a6ef7bdada37b273af366e37f81"
                },
                "creationTimestamp": "2026-04-15T22:57:03Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18838",
                "uid": "7f5c3ae4-7466-4331-aa95-886ff7bfba18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a7a78b0e6419afde4137d44ed7c9fa82b1b31c536f3eedbd1c9be9a7781c05ae"
                },
                "creationTimestamp": "2026-04-15T22:57:03Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18846",
                "uid": "b0e16f68-b4c0-4dd6-919f-49c1aefa6ab2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "cf5bdb4ef292adc185d9405db526471c66a7daa10495325faf853b210cc87407"
                },
                "creationTimestamp": "2026-04-15T22:57:04Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18855",
                "uid": "95367e7c-28df-4711-b531-cb2e362f1eba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c7e700533beca03c429ddbb9ea3243ad02dfa6092036638d53a1985410a276db"
                },
                "creationTimestamp": "2026-04-15T22:57:04Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18851",
                "uid": "c44da4a2-1921-46d8-ad4b-012ccec0567f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0dcb88b66d0c670611d1e9300a89a0572d37eb1a708c601b39986dd4246d52f1"
                },
                "creationTimestamp": "2026-04-15T22:57:04Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18861",
                "uid": "36cf84bf-905e-474f-bea0-7256ea964cf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9d4b82dffd707dd2525551ac0857be8df933194dc7861988883cfbbf30f6e25e"
                },
                "creationTimestamp": "2026-04-15T22:57:03Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18844",
                "uid": "dda57dce-65ae-4375-9f08-96b1ea0fd74f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "846288de136f320e006c5821e2590c684ff7b97690a5340bf5121ad362eb883c"
                },
                "creationTimestamp": "2026-04-15T22:57:03Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-4k766",
                        "uid": "9419d824-8575-48bd-8368-4ae8264ab610"
                    }
                ],
                "resourceVersion": "18849",
                "uid": "f12959e6-59dd-4eb8-9338-21f35ee77f8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3676b74ad9e3d019dfd85dbdcab7f8e11f3cb779f49db7d1d7c1447e7d16ce78"
                },
                "creationTimestamp": "2026-04-15T22:58:07Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.16.0"
                },
                "name": "tekton-results-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-t9m9d",
                        "uid": "f57d0b4d-4a9d-46e9-ab49-e6bcb3b4dea8"
                    }
                ],
                "resourceVersion": "20259",
                "uid": "8dc3293a-779d-426c-979c-968efb758f27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "30e04ff31f8c3d6b5465704754519450a8372eae2f444aaf1f9b5ae84fe94b1d"
                },
                "creationTimestamp": "2026-04-15T22:58:29Z",
                "name": "tekton-results-route-view-auth",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-post-x5659",
                        "uid": "fe9c4e1d-0cdf-4597-98f3-d162fa532a2f"
                    }
                ],
                "resourceVersion": "20564",
                "uid": "edec69e9-9601-4b03-94ce-451d516794a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-route-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "adc12569b1004537e55e32a9fe00c3b9239cdbc87ca83dc6c0b11534e25e34a7"
                },
                "creationTimestamp": "2026-04-15T22:57:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-q2kxt",
                        "uid": "4162ea29-6135-4d38-9de8-a64c86c40f05"
                    }
                ],
                "resourceVersion": "19427",
                "uid": "48ab62be-9a9a-4300-a398-9b821a491b30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7b4c0b4162d67fd1a5cf3788b1fde2645c9852094f8350d9e7323c1906add119"
                },
                "creationTimestamp": "2026-04-15T22:57:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-q2kxt",
                        "uid": "4162ea29-6135-4d38-9de8-a64c86c40f05"
                    }
                ],
                "resourceVersion": "19430",
                "uid": "8f4d65a9-b0b4-4a6d-a4ca-062a86be4d3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fcf1b5e4fa6cf7cb12ca56643b38cd06a2c6bcc7d8bf8d0675da3d5074469b6a"
                },
                "creationTimestamp": "2026-04-15T22:57:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-q2kxt",
                        "uid": "4162ea29-6135-4d38-9de8-a64c86c40f05"
                    }
                ],
                "resourceVersion": "19426",
                "uid": "5e2a4539-d1bd-4f4f-8628-8002fe81c1e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-konflux",
                    "meta.helm.sh/release-namespace": "konflux-ui"
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm",
                    "helmet.t.t.t.t.t.t.t.t.t.redhat-appstudio.github.com/post-deploy": "delete"
                },
                "name": "tsf-konflux-secret-rw-pipelines",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23296",
                "uid": "8d60c6c2-42d8-4154-b384-fcc41a1c4031"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tsf-konflux-secret-rw"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tsf-konflux",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-pipelines",
                    "meta.helm.sh/release-namespace": "tsf"
                },
                "creationTimestamp": "2026-04-15T22:59:26Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm",
                    "helmet.t.t.t.t.t.t.t.t.t.redhat-appstudio.github.com/post-deploy": "delete"
                },
                "name": "tsf-pipelines-secret-rw",
                "namespace": "openshift-pipelines",
                "resourceVersion": "21939",
                "uid": "0a6c8527-8bb7-40ac-976f-7a405e4d449d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tsf-pipelines-secret-rw"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tsf-pipelines",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6168",
                "uid": "30b16bbb-6094-402f-87cb-0525a2d1c04f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4821",
                "uid": "a448db12-dd64-42af-8eef-693b96faab76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:30Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4860",
                "uid": "ce1f9122-8740-4b64-b543-d78cb324c13b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5143",
                "uid": "0af41be5-e8ec-40ab-8323-7239e241c47a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5201",
                "uid": "a5462702-160f-4aa1-acbf-6da106bd9045"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5681",
                "uid": "202234f1-701e-4b6c-b34e-7a959ca20394"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5093",
                "uid": "9e78a115-20ed-476f-b2b6-ea3913f0cc56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5488",
                "uid": "3329bddb-83a4-4326-89bc-04e8add746e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5462",
                "uid": "198c5882-2b7e-4d5d-9eeb-768daf5ae721"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5819",
                "uid": "bf2602eb-fdbd-4ffc-b5f6-22ae84ad7a7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5790",
                "uid": "05af244d-f18d-4f00-bf68-d3fde6f3b9b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6158",
                "uid": "f37a73a0-6c71-4d16-8a92-d15e7067bfa6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:44:21Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "openshift-route-controllers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "1476",
                "uid": "b0734789-02d3-49db-834e-5c3a1bafe0ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-route-controllers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4418",
                "uid": "b6307e8b-87b9-4e5c-8c7c-01a8c1b11ea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4444",
                "uid": "ed63c8d3-e934-4562-818f-eb670d247100"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4417",
                "uid": "cf80e3d8-26d2-48f8-b9be-299a4ff7704d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6147",
                "uid": "014fcda6-aa24-453e-9ddc-72c2e3440ac2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4697",
                "uid": "de2dbcf9-1725-4c1f-877b-68deffc042a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4803",
                "uid": "98300237-65b1-4d02-a184-15a883994a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5172",
                "uid": "bc13c5c2-8267-434e-ae6b-d7133e51d21c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5162",
                "uid": "c4097c17-7ca2-4101-bb5c-597f33b7e38c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5685",
                "uid": "84f36307-dc79-4a1f-a3ce-9abbd4c18e47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5029",
                "uid": "7ec9256b-ab67-4838-a444-786791c1c945"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5420",
                "uid": "1bb54220-b349-4208-9c18-c2645c0f2697"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:51Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5374",
                "uid": "7f84192f-2123-43c9-a4d6-5824d364e8ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:05Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5751",
                "uid": "b0d33faf-fbbc-40e0-9f93-1b6436eedec5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:07Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5793",
                "uid": "d2c1542c-b281-4ee1-be06-61ef50024689"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6226",
                "uid": "e760e765-deb2-4d99-bd63-ac61a7f8b2b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:10Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "985",
                "uid": "f9ec75ce-8391-44e7-aee4-d970fb7147fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4452",
                "uid": "25aabfc9-941c-4bc2-b5fc-151fe7bb2297"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4459",
                "uid": "7ef786dd-59e8-42fa-abe8-c69666d8154f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4458",
                "uid": "9f6006d9-af80-4af8-b779-93d47cebd07e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:41Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9522",
                "uid": "d4ee3eb5-55f9-49bb-9bd2-daf16d253897"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10575",
                "uid": "85b10cf1-4286-4e5e-92c7-4b42e352b63f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:55Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10080",
                "uid": "cc3a385f-142e-4f41-9350-8c5d2319e28e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:03Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10544",
                "uid": "068a0877-18f0-415b-9720-48e78325e8a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:55Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10017",
                "uid": "f5d4724e-e8dd-459c-acf6-024a41958620"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:42Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9576",
                "uid": "921ea8b9-960c-4855-b11c-3cdaa0a916fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9376",
                "uid": "a773d163-e267-4b09-982b-6d80eb4c432e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:36Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9368",
                "uid": "36824fbc-757d-4514-892c-d5eb5b8a75f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10421",
                "uid": "cdcd6dcb-e0a2-4caa-a88f-f14eb71bb8c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10194",
                "uid": "f9276195-1dff-4bce-b410-586574dc1736"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9757",
                "uid": "f3845a22-750f-4466-b657-70520be77899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:47Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9680",
                "uid": "4ec52841-108e-41b6-9c52-c908f92fd6ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:32Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9267",
                "uid": "8c3d4e02-86ca-4870-b076-1c7e412bb613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:32Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9266",
                "uid": "be7d719c-baec-47c3-b812-9929d117b18f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:50:32Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9261",
                "uid": "a81fb23e-6b1c-4a96-af09-312b8dffdef3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:50:32Z",
                "name": "system:openshift:controller:service-ca",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9239",
                "uid": "73e55650-37b9-40d0-ab42-a06942b0a66d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6194",
                "uid": "e3e968be-3b34-41a9-9d44-7f9fced38d02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4801",
                "uid": "129c6a90-4699-4f51-87f8-4f2c8bbd0f89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4794",
                "uid": "ca639f18-9951-4869-bc33-d9def1e36b2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5202",
                "uid": "27b2f78f-c372-4727-95dd-c899ecc7fd80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5173",
                "uid": "1384ea92-7d90-45ca-a7cd-1908e0cff805"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5739",
                "uid": "f17d33a6-bf5d-4d2e-a5b5-a383cfc5df09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:36Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5058",
                "uid": "7884e182-c773-4857-979d-e1dcef62ca9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:50Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5358",
                "uid": "36b46d97-ebd6-488a-a599-bfab3d09fb9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:53Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5418",
                "uid": "b1ff1379-82cb-4595-96ad-bcf7d74e907f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:03Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5710",
                "uid": "34539f33-6835-43c6-8854-fb479c0e80a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:09Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5840",
                "uid": "18fdfc1d-7492-454b-af9c-1d25edd41a77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6307",
                "uid": "c27baa11-24b9-440f-81bb-1580a17ed25e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:24Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-user-workload-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1699",
                "uid": "83106c47-b129-4d35-aeb5-0b1703bf33e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "dedicated-admins-uwm-config-create",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4928",
                "uid": "3f025cf9-2aef-480f-8167-7570046c6054"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-create-cm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "dedicated-admins-uwm-config-edit",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4923",
                "uid": "d3e66898-4ec8-4f0c-8267-2a8167111f49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "user-workload-monitoring-config-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:33Z",
                "name": "dedicated-admins-uwm-managed-am-secret",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4934",
                "uid": "5e2fb87b-d111-4e78-8083-4a7160348375"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-manage-am-secret"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:51:13Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.7.3"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "11083",
                "uid": "390027ac-f5e3-4eee-ac15-c45e485122a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4470",
                "uid": "8a405a15-1830-4456-8b17-5bcd19dd2ae3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4479",
                "uid": "d9553cfd-4202-4c07-b9d8-544e49adf6bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4471",
                "uid": "64a9c29b-8d83-434f-b261-eda1d352b0a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift",
                "resourceVersion": "5990",
                "uid": "2b6911da-4ed3-4a84-9edc-f663f6b31460"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift",
                "resourceVersion": "4689",
                "uid": "31928ea8-9412-4728-a91d-c00eb1d791d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:25Z",
                "name": "backplane-csm-0",
                "namespace": "openshift",
                "resourceVersion": "4703",
                "uid": "cad1267d-2176-4ca2-af19-1cac354b16d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:41Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift",
                "resourceVersion": "5146",
                "uid": "ef2ba20a-276a-4c2d-8b28-29723210f0cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift",
                "resourceVersion": "5098",
                "uid": "9236025b-e0f2-4840-a1f5-7d4026219c62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift",
                "resourceVersion": "5722",
                "uid": "2169b0f2-f9b7-4188-8fca-b9033840365d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift",
                "resourceVersion": "5094",
                "uid": "ec255baa-af00-4c5b-8fb7-6d9e17be0b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift",
                "resourceVersion": "5461",
                "uid": "effee300-11c7-4415-8ba7-ef0eff90778b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:45:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift",
                "resourceVersion": "5474",
                "uid": "946f4710-d38e-4f5b-a387-356a68689745"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:06Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift",
                "resourceVersion": "5769",
                "uid": "259e03f2-1b8c-4021-b5ad-c624bc6b29e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift",
                "resourceVersion": "6008",
                "uid": "05b992b0-72f4-472d-8b77-49ab948d0e4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:46:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift",
                "resourceVersion": "6173",
                "uid": "208fb163-4ae9-4ee0-bb86-e9244c14aa98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:26Z",
                "name": "cluster-samples-operator-openshift-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "1898",
                "uid": "e7bb3b5e-8d3c-4d0f-a264-51d2af231b66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "OperatorLifecycleManager",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:44:28Z",
                "name": "copied-csv-viewers",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "c0d7e3f1-1666-4518-8f2d-a5a3fde75484"
                    }
                ],
                "resourceVersion": "2140",
                "uid": "a98824c7-440f-43e1-b6ac-5a8fb2164981"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "copied-csv-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18114",
                "uid": "235358a4-7a36-4c2a-963b-848547e32b95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "67fbf26f5179f4e5a3546f939efbde74d8a9f5d6c0e985232981d123a945a7ac"
                },
                "creationTimestamp": "2026-04-15T22:59:10Z",
                "labels": {
                    "app.kubernetes.io/part-of": "pipelines-as-code"
                },
                "name": "pipelines-as-code-templates",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-post-rs24b",
                        "uid": "1ff0e9ba-3a1b-4c37-b975-5ef6a92daebd"
                    }
                ],
                "resourceVersion": "21716",
                "uid": "c4c19a9a-1f71-49bf-80fa-a95bb3b37ea1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-templates"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18111",
                "uid": "c6c66cde-2f71-4162-9155-b110270a606b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-15T22:43:36Z",
                "name": "shared-resource-viewers",
                "namespace": "openshift",
                "resourceVersion": "418",
                "uid": "174b9ede-7517-487c-b1b9-5983081a292b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "shared-resource-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:deployers",
                "namespace": "openshift",
                "resourceVersion": "3307",
                "uid": "c10742ac-649c-464d-af31-7b2133c8dcef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-builders",
                "namespace": "openshift",
                "resourceVersion": "3312",
                "uid": "42327b2a-29bc-495c-a6f3-336bec47b942"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:44:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift",
                "resourceVersion": "3323",
                "uid": "ddd59791-97de-4f2c-ad4a-2aa569f0600a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b11eaf2e97c1754fc7aca314f5a27b360c9182df649aca0490b9c89f897537fb",
                    "operator.tekton.dev/preserve-namespace": "true"
                },
                "creationTimestamp": "2026-04-15T22:58:34Z",
                "name": "tekton-default-pipelines-view",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-hnrtp",
                        "uid": "50e2f7e3-26ea-4ba0-ad7f-8cd8f94d3eec"
                    }
                ],
                "resourceVersion": "20958",
                "uid": "df2f5bfb-e6d1-4d95-ad82-5a20fe1a5472"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-default-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "release-service",
                "resourceVersion": "24503",
                "uid": "6f70255f-cba1-4931-a408-4b4ec35285d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "release-service",
                "resourceVersion": "23971",
                "uid": "c1df45a5-9a58-4af5-96b3-f8fa15ea2363"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admins-0",
                "namespace": "release-service",
                "resourceVersion": "24485",
                "uid": "9bdc3d1f-93d2-4145-af48-03b533809899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "release-service",
                "resourceVersion": "24190",
                "uid": "049aef70-ca23-4646-aaf9-3f8f0223dc4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "release-service",
                "resourceVersion": "23838",
                "uid": "701eda23-4408-4d84-8c5f-a12f3182264b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "openshift-pipelines-edit",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24216",
                "uid": "06d76eb3-2b12-47d3-8a79-391bcb86b0b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24204",
                "uid": "4b0eb23a-89f3-42c8-92ff-28a40f3d7373"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "release",
                    "konflux.konflux-ci.dev/owner": "konflux-release-service"
                },
                "name": "release-service-leader-election-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxReleaseService",
                        "name": "konflux-release-service",
                        "uid": "204ce3c7-0e98-4445-ba1e-0c59e3714f62"
                    }
                ],
                "resourceVersion": "23902",
                "uid": "7440c81e-5bae-44ee-95ce-93bdc06d4746"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "labels": {
                    "konflux.konflux-ci.dev/component": "release",
                    "konflux.konflux-ci.dev/owner": "konflux-release-service"
                },
                "name": "releaseserviceconfigs-rolebinding",
                "namespace": "release-service",
                "ownerReferences": [
                    {
                        "apiVersion": "konflux.konflux-ci.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KonfluxReleaseService",
                        "name": "konflux-release-service",
                        "uid": "204ce3c7-0e98-4445-ba1e-0c59e3714f62"
                    }
                ],
                "resourceVersion": "23939",
                "uid": "1ea99e43-8278-43a6-be78-552e19c50a55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "releaseserviceconfig-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "system:deployers",
                "namespace": "release-service",
                "resourceVersion": "23809",
                "uid": "dc46e7a5-b445-435f-a3fd-449abc08fba3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "system:image-builders",
                "namespace": "release-service",
                "resourceVersion": "23810",
                "uid": "193aef61-3e0a-47e9-addb-386cf005eb09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:37Z",
                "name": "system:image-pullers",
                "namespace": "release-service",
                "resourceVersion": "23811",
                "uid": "ef36f0a3-671e-4fcc-b5bc-de58c86ed2d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "rhbk-operator",
                "resourceVersion": "14368",
                "uid": "d61ef057-a658-423d-9dcc-3d24201fccc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "14675",
                "uid": "e7211fdb-9e4e-40e0-983b-26e2a4b20a50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "14637",
                "uid": "dd2efa3d-e332-4814-8623-0c89099b46fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "14651",
                "uid": "d10b2ef2-727a-4930-bbd8-8fc33259a0a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "14610",
                "uid": "e93005a2-f5ed-4d62-a67a-119182b8c0ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "14588",
                "uid": "fc989ec5-6a33-4015-aa23-b7568154f195"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18122",
                "uid": "fe88ddd0-1069-4a7e-94cd-8a7bb45b2961"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18119",
                "uid": "932b3c77-0b95-4d40-9a05-3fbfdc6bb3fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:26Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "rhbk-operator",
                    "olm.permissions.hash": "4Z6mzHw3Gux72vIWxroUVRIpSW5IOUFnONBDgt",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "fcc0de18-96ef-4c46-b76b-913ddc263d94"
                    }
                ],
                "resourceVersion": "15545",
                "uid": "940c1f60-f048-4df0-bc22-0cf4203aaf4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:22Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhbk-operator.v26.4.11-opr.1",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "cbf5c508-44b8-4686-979d-e60c9eb532ac"
                    }
                ],
                "resourceVersion": "15366",
                "uid": "aa2a5efc-efd8-4ee4-ab44-a7e04f88734a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-opr.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "rhbk-operator",
                "resourceVersion": "14445",
                "uid": "565cdf19-24c4-4671-b91d-7f5a268eac60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "rhbk-operator",
                "resourceVersion": "14443",
                "uid": "866d36f0-bdf7-408d-b173-d988060da9d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "rhbk-operator",
                "resourceVersion": "14441",
                "uid": "37d5a7ee-0e20-43a8-8747-eeeb789b3ed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14373",
                "uid": "72ef6c35-45e8-40fb-81bb-294cf578d869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14683",
                "uid": "9f0dc29e-bf44-4e46-800c-49bf2d6482b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14647",
                "uid": "1b225601-1ce5-4c4c-af3a-bf75764bb47e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14654",
                "uid": "4f277a40-5c2e-4545-a4a0-97a22837300c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14623",
                "uid": "568444eb-cd08-4dfd-8513-e9ae9eb636f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14596",
                "uid": "133f9ba1-b3ea-437a-bf42-3a5a9574d271"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18131",
                "uid": "235187fb-5ef9-47d9-a2bd-b290352114d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18127",
                "uid": "43444c4a-c6cb-4ab8-9a5e-54714569303f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14452",
                "uid": "20269998-cd80-4f21-8c07-231b96c59ad2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14455",
                "uid": "539fbcbc-4be5-49d0-bacf-752c73598608"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "14446",
                "uid": "55e30dae-1b47-42e4-90ff-1ff89d5840ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "segment-bridge",
                "resourceVersion": "24511",
                "uid": "deea4475-66a7-4ffe-9cb4-58713f1a0698"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "segment-bridge",
                "resourceVersion": "24003",
                "uid": "9e8f0458-2a24-409a-9c91-534347e5897d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:44Z",
                "name": "dedicated-admins-0",
                "namespace": "segment-bridge",
                "resourceVersion": "24504",
                "uid": "02905461-da69-46b6-8242-5017ef0cf7e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:39Z",
                "name": "dedicated-admins-1",
                "namespace": "segment-bridge",
                "resourceVersion": "24098",
                "uid": "285975b1-aac2-4a96-911d-a315abdfca19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "segment-bridge",
                "resourceVersion": "23970",
                "uid": "1d3d0012-7bb6-46f5-bc5e-c52b0356256a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:42Z",
                "name": "openshift-pipelines-edit",
                "namespace": "segment-bridge",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24392",
                "uid": "5ae4c225-0876-4100-a09a-ef74a568116f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:42Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "segment-bridge",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "24382",
                "uid": "2093749a-cfeb-4a00-a3d5-79dd53393321"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:deployers",
                "namespace": "segment-bridge",
                "resourceVersion": "24039",
                "uid": "b5d43316-2daa-474a-b69a-570e75729e5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-builders",
                "namespace": "segment-bridge",
                "resourceVersion": "24041",
                "uid": "b6b536b8-92ba-46b2-ae6b-3127a88bcc24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T23:00:38Z",
                "name": "system:image-pullers",
                "namespace": "segment-bridge",
                "resourceVersion": "24037",
                "uid": "d51b5eba-eda9-4ff0-b15c-24109f04a45a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:segment-bridge"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17550",
                "uid": "41358de1-c7c0-4ca6-9451-9be241d413b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17569",
                "uid": "3dca502b-6cdf-4837-a8fe-49ae4e24dc4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "dedicated-admins-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17528",
                "uid": "ee80fddc-459f-4373-9045-7e165736a11b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "dedicated-admins-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17523",
                "uid": "6a53eea3-158c-4e35-8426-4ad16f910f79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17537",
                "uid": "cdc5aefd-5da0-41d6-9ead-96ed96400966"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "openshift-pipelines-edit",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18139",
                "uid": "507b9459-3502-45d1-8eef-0071c305a4ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18136",
                "uid": "3ef0d0ae-87ea-491b-9cb4-1532bac55c17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "system:deployers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17539",
                "uid": "4e4ae9ea-41b7-49bb-b8fa-50a1cbaddcb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "system:image-builders",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17538",
                "uid": "de9441c9-03d7-46c9-90a9-4cc28939c09e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:45Z",
                "name": "system:image-pullers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17536",
                "uid": "769a7e32-15bf-48d4-b621-5495ab14cc9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14369",
                "uid": "7b317d85-1fb1-46b7-9aad-3762f4628bc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14658",
                "uid": "63686445-59ff-4b77-815d-386b63cd2cdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14652",
                "uid": "b5f1277d-bafd-48af-a2e5-a2c024ec8c41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14638",
                "uid": "9a79ac47-df28-4d65-9c2e-2b53ee32e0c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14587",
                "uid": "4a2b350d-4da6-41a5-b5bc-f1f478923ca8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14600",
                "uid": "46a28dc4-abad-4f7f-b451-80124ca19394"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18159",
                "uid": "93f3245d-6e19-4a4f-bf9e-2bb1223db67f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18155",
                "uid": "6200d4fb-2c50-45e0-845d-ab7364a71f58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:26Z",
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tsf-keycloak",
                    "olm.permissions.hash": "4Z6mzHw3Gux72vIWxroUVRIpSW5IOUFnONBDgt"
                },
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG",
                "namespace": "tsf-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "617c15aa-2571-4b6c-b723-41a47ebd61a2"
                    }
                ],
                "resourceVersion": "15495",
                "uid": "5d8594cf-b4e9-4401-8a56-d7d8ed98782b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14439",
                "uid": "5c2a743d-cb34-4661-8ff6-e5c12dccecf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14437",
                "uid": "59bcf0fe-d8ab-4a48-a778-97a46ab6c294"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "tsf-keycloak",
                "resourceVersion": "14438",
                "uid": "cb51fd63-6647-49bf-b4c8-85604cd93a84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "tsf-tas",
                "resourceVersion": "14367",
                "uid": "2d792371-71f4-4623-9188-bb99f48da1a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:58:34Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "ctlog",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "ctlog-createtree-job",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "CTlog",
                        "name": "trusted-artifact-signer",
                        "uid": "93f8e769-145d-420e-a7b7-f36ef8616d43"
                    }
                ],
                "resourceVersion": "20947",
                "uid": "8267916b-76ee-4068-bc66-43a796ae0a9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ctlog-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ctlog-createtree-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-tas",
                "resourceVersion": "14676",
                "uid": "6ebee580-6119-4297-b1a8-d9c03bd31fca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-tas",
                "resourceVersion": "14653",
                "uid": "d7d6f73d-fa1b-4a21-ac94-6d71af1092d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-tas",
                "resourceVersion": "14656",
                "uid": "5c7ca66e-eba0-4305-a24d-2da444e499d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-tas",
                "resourceVersion": "14589",
                "uid": "d7fc4c9b-eaf4-4e9a-98d2-e327fda83bdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-tas",
                "resourceVersion": "14604",
                "uid": "3bbb8859-76c2-4843-b239-a6f37b086426"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18169",
                "uid": "ebc4d70a-40f1-4ee6-a111-d6d7acfe7ccc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18167",
                "uid": "7d3306fe-e2b2-47db-9ffe-5276438269d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:58:34Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "rekor",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rekor-createtree-job",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Rekor",
                        "name": "trusted-artifact-signer",
                        "uid": "bdba91f6-013b-4947-9f07-1192321b018e"
                    }
                ],
                "resourceVersion": "21086",
                "uid": "565c74cc-15cf-4d0c-a4f0-8c73ee525e9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rekor-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rekor-createtree-job",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "tsf-tas",
                "resourceVersion": "14444",
                "uid": "444b01d5-f989-4812-a3ac-53e10b96be28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "tsf-tas",
                "resourceVersion": "14435",
                "uid": "47af5eb8-2cc4-4ce8-aba1-d3cf2bd17cb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "tsf-tas",
                "resourceVersion": "14434",
                "uid": "f5e51662-657b-4ff8-a32d-e4b158d3dd19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:58:34Z",
                "labels": {
                    "app.kubernetes.io/component": "trillian-logsigner",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "trillian-logsigner",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "trillian-logsigner",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Trillian",
                        "name": "trusted-artifact-signer",
                        "uid": "3b1cbe21-746b-433d-8f36-a141bb8dfa6d"
                    }
                ],
                "resourceVersion": "20889",
                "uid": "adb66279-2370-47d0-a366-161edfbe2523"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trillian-logsigner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trillian-logsigner",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T23:00:04Z",
                "labels": {
                    "app.kubernetes.io/component": "tuf",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "tuf-repository-init",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "tuf-repository-init",
                "namespace": "tsf-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Tuf",
                        "name": "trusted-artifact-signer",
                        "uid": "5b439219-c6e0-4f6c-988e-338319f80f6a"
                    }
                ],
                "resourceVersion": "22793",
                "uid": "e402b3cf-5e73-4cc7-adb1-234608c701a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tuf-repository-init"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuf-repository-init",
                    "namespace": "tsf-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "admin",
                "namespace": "tsf-tpa",
                "resourceVersion": "14372",
                "uid": "87c51b29-b18c-45ac-9af7-28a44d0dc5c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "14666",
                "uid": "a773bb18-0add-42ee-b952-5aea397b41c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf-tpa",
                "resourceVersion": "14639",
                "uid": "0d8e7469-5c02-427b-b7f4-740e3de31abd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:06Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "14640",
                "uid": "e2e3be7b-adfa-41d9-b0f0-b67264b2d47a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf-tpa",
                "resourceVersion": "14595",
                "uid": "2037fed6-7ab1-4dcb-98f7-f70ba4d21574"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf-tpa",
                "resourceVersion": "14609",
                "uid": "c8c441e1-345d-49e8-8429-0326c2afc867"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:55Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18178",
                "uid": "09a5432a-fd15-490d-a00a-ae35d22903b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18174",
                "uid": "3d499ab3-9eab-4cc6-815f-d0357dcd0b78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:12Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-get-ingress",
                "namespace": "tsf-tpa",
                "resourceVersion": "14805",
                "uid": "914b6711-86b2-4014-ba38-c716bea9548f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "allow-get-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "placeholder"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:12Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-job",
                "namespace": "tsf-tpa",
                "resourceVersion": "14820",
                "uid": "aeccc015-631c-46ea-8096-b3678d460363"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:12Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator.v1.1.3",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtpa-operator.v1.1.3",
                        "uid": "258e4a59-017a-40e2-a471-f4f5d7faad7a"
                    }
                ],
                "resourceVersion": "14819",
                "uid": "a69c79f9-573c-4aab-8bd1-7747b32810be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:15Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tsf-tpa",
                    "olm.permissions.hash": "1VbZlVPW3RG9SrUkHFJpBte3eHmQYe0nZ1z1w3",
                    "operators.coreos.com/rhtpa-operator.tsf-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.3-rh-3fL1IkYvKoDCvFu8xg8cnu3vyAd5zyIzYGf2L2",
                "namespace": "tsf-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtpa-operator.v1.1.3",
                        "uid": "26e23100-a6a3-4458-8730-0f0bc0ccc550"
                    }
                ],
                "resourceVersion": "15355",
                "uid": "1f97f8c2-a80d-4745-924a-c45dc1e421aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.3-rh-3fL1IkYvKoDCvFu8xg8cnu3vyAd5zyIzYGf2L2"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:deployers",
                "namespace": "tsf-tpa",
                "resourceVersion": "14453",
                "uid": "0ae3a836-938f-4253-9f53-7b2f5cc3587e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-builders",
                "namespace": "tsf-tpa",
                "resourceVersion": "14457",
                "uid": "eb46dd74-c982-4097-918a-fa2d9aaf26fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:56:00Z",
                "name": "system:image-pullers",
                "namespace": "tsf-tpa",
                "resourceVersion": "14454",
                "uid": "92be7ba8-3af0-413e-ab92-2145649c597c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tsf",
                "resourceVersion": "14223",
                "uid": "b0168c24-e055-41fa-8db8-a3221e9a7c73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tsf",
                "resourceVersion": "14214",
                "uid": "93dcb91f-4392-4823-aa14-080f8d122489"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "dedicated-admins-0",
                "namespace": "tsf",
                "resourceVersion": "14227",
                "uid": "0e2b87da-c1b5-4064-b6a5-d44557b562a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "dedicated-admins-1",
                "namespace": "tsf",
                "resourceVersion": "14220",
                "uid": "d620d82c-b74f-4710-aa57-c5a4678f404c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tsf",
                "resourceVersion": "14228",
                "uid": "0a5346c9-200f-4a9f-a17b-8127722112cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tsf",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18147",
                "uid": "0b32b7a9-7594-4ac7-b5c3-a83c0b5de042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-15T22:56:54Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tsf",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-x8l7m",
                        "uid": "9140cd31-7299-4dda-8042-9a9b18888eeb"
                    }
                ],
                "resourceVersion": "18144",
                "uid": "d4c8db62-599e-4069-9fac-f5ebf1307aed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "system:deployers",
                "namespace": "tsf",
                "resourceVersion": "14221",
                "uid": "c46104a8-0a38-4274-b1b0-7cad4763f0d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "system:image-builders",
                "namespace": "tsf",
                "resourceVersion": "14225",
                "uid": "987f5ad5-f5fc-4ec1-a445-922c1b1aba38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-15T22:55:55Z",
                "name": "system:image-pullers",
                "namespace": "tsf",
                "resourceVersion": "14222",
                "uid": "e4f43451-1e40-49d3-b32c-5ca602f8deb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tsf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-konflux",
                    "meta.helm.sh/release-namespace": "konflux-ui"
                },
                "creationTimestamp": "2026-04-15T23:00:36Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm",
                    "helmet.t.t.t.t.t.t.t.t.t.redhat-appstudio.github.com/post-deploy": "delete"
                },
                "name": "tsf-konflux-secret-rw-installer-ns",
                "namespace": "tsf",
                "resourceVersion": "23294",
                "uid": "dfe3a356-3bea-45b0-be8c-d087fb1e78d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tsf-konflux-secret-rw"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tsf-konflux",
                    "namespace": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "meta.helm.sh/release-name": "tsf-pipelines",
                    "meta.helm.sh/release-namespace": "tsf"
                },
                "creationTimestamp": "2026-04-15T22:59:26Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "Helm",
                    "helmet.t.t.t.t.t.t.t.t.t.redhat-appstudio.github.com/post-deploy": "delete"
                },
                "name": "tsf-pipelines-secret-rw-installer-ns",
                "namespace": "tsf",
                "resourceVersion": "21938",
                "uid": "a794c245-9fba-438f-b092-9301facec6dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tsf-pipelines-secret-rw"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tsf-pipelines",
                    "namespace": "tsf"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
