2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=0fe91382401630df2c26c5525dd9eb9c0df1b0ef logger=setup/version v=2 version=v1.17.1 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-03-17T17:41:36Z DBG k8s.io/client-go@v0.35.1/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:415 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:431 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:440 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:445 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:453 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:461 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:477 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:491 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:505 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:511 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:525 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:546 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/pkg/config/config.go:561 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-03-17T17:41:36Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-03-17T17:41:36Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-03-17T17:41:36Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-03-17T17:41:37Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-03-17T17:41:37Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-03-17T17:41:37Z INF k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-58c9d79bd8-rtrzn logger=setup/leader-election v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-03-17T17:41:37Z TRC k8s.io/client-go@v0.35.1/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.1/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-03-17T17:41:37Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-03-17T17:41:42Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=0de9832a-5d9f-431d-ad05-cd11a05e1f25 v=2 2026-03-17T17:41:42Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-03-17T17:41:42Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-03-17T17:41:42Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=190c347f-c6b5-447a-8730-41d79a87259b v=2 2026-03-17T17:42:37Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=20e4477d-12cc-4a18-afdd-5bd056a89fe6 v=2 2026-03-17T17:42:37Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-03-17T17:42:39Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=b114d71e-092f-4c5e-9cec-f7ae9b70883c v=2 2026-03-17T17:42:39Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-03-17T17:42:39Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:256 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-03-17T17:44:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=e467f6e9-fed0-4a89-8dac-e010fd69e1dc user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=4efb118b516d1fb0521ce458ae3709b18c7ca55f3056de6f43b784a76365686b"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-17T17:44:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=9e38b280-6098-4f54-9687-35e88861b449 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=4efb118b516d1fb0521ce458ae3709b18c7ca55f3056de6f43b784a76365686b"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-17T17:52:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=build-e2e-aovh namespace=build-e2e-aovh operation=CREATE policy=deny-virtual-domain resource=build-e2e-aovh/Namespace/build-e2e-aovh resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=28739344-ccc3-429b-9266-1069a88588bd user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=4efb118b516d1fb0521ce458ae3709b18c7ca55f3056de6f43b784a76365686b"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-03-17T17:53:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-default-qorfhc-on-pull-request-vlb4c-init-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4a2c41ec-8333-4402-b332-632d10d1758f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:53:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-pull-request-tzm4s-init-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c98371de-bae0-4703-945d-109bd53969cc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:53:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c16962c3ac72f731db8df4c676b52846cb45ef6fb8a4ce5d872-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=081b71be-3144-4891-a902-578513d9e950 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:54:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-16962c3ac72fcab9488e580694701b5b90c1dc9d7e90-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=06314e7a-a5ce-43bf-aeef-dd84d02d465d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custo16962c3ac72f7308fb889407de3eae003a763581172741-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b698f0bb-b58b-4c66-92fb-5459bb64bb1a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-16962c3ac72f731db8bc48497daef658583b7d783d4f36a679e828eb-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2fbca8f0-7d9f-4a9b-b082-4a0dcc606648 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz446ecdbfc50105d99318072d9df561bc-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1e5f8ef8-de77-478c-93f1-107e45546fbb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz585c1b00ec4f2c2c3d7cf0574de2997c-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d09d1c64-fa40-4606-80c0-7214dbfbcb24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-16962c3ac72fa6a2636c90fa7bd3cb482caa3b9f6456-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bf9b5956-b186-40e2-b407-0bef266b88b1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrza6ae6046fc4bfed238912bba95a169f0-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c7ab2165-0d50-4652-94fe-2e5eda81b697 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-16962c3ac72f731db8bc4849a2c44878057a0ae57c1206717863aeb6-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1c9f5fdb-5e30-47d2-88d1-8b55f4c685e8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom16962c3ac72f7d7eda1285a13dd6b477433c0d3aa52d1-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=140f9730-d4b1-4213-81a8-e479f59500c2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cust16962c3ac72f731ee28549397622a692e1d744efa865f7c-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=67ab5079-2dc3-432b-ab75-1e2532ed7fc9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz3002793754afad45befc08a6eb447798-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=41a8db11-6484-4e33-911f-95c951591e2b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-16962c3ac72ff487e10db552d7890c257f15f3638aab-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9e979393-d20c-46c3-ae75-94babd0a1e81 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:55:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cus16962c3ac72f731d98acde762c1f972e3a90178448ab7637-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03a237f0-61e6-4dc6-b0a2-ffe22e31ae5a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:56:26Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-03-17T17:56:29Z ERR k8s.io/client-go@v0.35.1/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-03-17T17:59:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-pull-request-9dskk-init-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d053f365-bec6-4672-b1f5-c0fe540b0c8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:59:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cd6c29e77dc86e44460276653bc3c6bd616036d2f880da82c47-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f34ce44-9e42-47b7-9fec-006a42d14cb8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T17:59:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-d6c29e77dc869ec96c129096f57306c3399c11b392cc-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5b780316-7944-41bd-8926-e066fdd8e09a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custod6c29e77dc86e437cb17bda12a98de276002cbe4279f99-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=36f4598b-5b5b-4d8b-ba18-4dd47c8a7dcf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-d6c29e77dc86e4446025d9908c4af897e2af4dfedc93c9273cdfc79b-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ff7357e7-1808-40ab-bee5-d972dabee090 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzf77bc64823d46fe460b4f3ccee94b19c-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8451af74-40c1-4914-891d-c8bdf6301116 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzc68d0da299f15a9486071aa09cba27d9-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=363efe11-f8d4-42c6-8d38-6826e31a102e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-d6c29e77dc86862e284f1cbece68cda8f085236c7f49-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=46a03af3-4c9a-4216-b4bb-277e3b8915a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz07b5d0b61e49ec702b0782e11e810abf-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5375091-39ca-4c62-a955-5620a5f90b75 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-d6c29e77dc86e4446025d99079f7e0fc264647bf699bb4c43615716b-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c7ae2e1-977b-41bf-bd13-6515684036ee user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custd6c29e77dc86e4416e573857a01a32bfe7945df265b0b96-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=36609af0-5ad2-4c95-a8fe-80ae51ec2e1f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-customd6c29e77dc86eee15258f608ae08be2bf899af2992e86-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9bc67bb5-727e-44ee-ac0d-b25c91e33472 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzcaed8d323b8d0bb1321b6c4b7b1efd50-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0d660672-ce3e-4bf9-b1ff-c53b74838314 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-d6c29e77dc86ff6205dde227dd7fd662409e111b06ce-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c790230-cd8b-4588-9f3a-8027e3a89eda user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:00:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-cusd6c29e77dc86e444a19bdfedb1bd14a92b63c8c44f94bc03-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=32f7a117-e6f2-47e5-a5d0-9d2bcbc33166 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:01:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-init-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a0bbf6a3-00b5-4dde-a472-9acc55ebaa50 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:02:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-c7462e1913e5d340cb76c9b47142c2f4d320082a62b48da65a4-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ab2fca9f-3448-4e8a-9da3-924bdfa87956 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:02:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-build-container-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f86c4f50-71de-4afc-a2a8-71bd51355c7a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:02:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrze9a6dd018abd1e36b0fa910683fb3146-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44d38ea6-ad5b-417a-9752-bfe24a898e2e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-7462e1913e5d340cb75124f3cd651d2d71dfcb7725a063329757d237-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8b37db86-fe74-4ca4-b290-cfecb6bea6db user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-clair-scan-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f089c4c7-c918-4efa-bc24-35bca7268bd9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz2b585fafa9d3c12fd6b7afbe1cb484c9-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f8b54a49-33fb-4319-afbb-e0eb4f445fc1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-sast-snyk-check-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7e01530c-c062-4d47-a1fd-34158fd17e69 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-clamav-scan-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=564d6f07-73fc-44fb-9c2e-c5061074885e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-7462e1913e5d340cb75124f3e1ca87c2c2664f82a18c3474d93e767d-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5f20d524-1b93-414f-bf82-ee3d5666d85c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-sast-shell-check-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7463005f-60ef-49b8-a8de-8da214cd1fc3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrz784a217adcacf168f0b7984b083fcf4e-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=09814ab4-051d-4f72-b337-004a2ba7ef1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-apply-tags-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=48bea1fa-496b-47a1-a735-ab178e41f9e4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzo-on-push-zlr7q-push-dockerfile-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a8ca3bb2-0fb3-4482-b3d1-9cbc658e2da5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-03-17T18:03:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","read-cluster-config","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role","tekton-scheduler-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=gh-test-custom-branch-rcyrzd2d0f08370e080e593231de5daa7802c-pod namespace=build-e2e-aovh operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f603fa9-56d8-45b5-8320-7ccb1e252098 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=f0c6f204-f90b-41ae-aacf-19282fc90923"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["48e10334-3398-4d51-b175-4531f7d248c2"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-564cbddb6c-njm8v"],"authentication.kubernetes.io/pod-uid":["489f19b1-ca28-4137-822f-524ba03c94b6"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"435c60d1-6ed2-4e15-a42f-47bdbbd301fb","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2