2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-11T12:51:07Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-11T12:51:07Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-11T12:51:07Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-11T12:51:08Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-11T12:51:08Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-2wkb8 logger=setup/leader-election v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=7c317aa2-18cb-4f7b-93e0-dbd6fedf5d9d v=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=44cfed7a-6c48-4461-b2e6-388ae2c3af2e v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-11T12:51:08Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-11T12:51:08Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-11T12:51:10Z INF github.com/kyverno/kyverno/pkg/logging/log.go:180 > 2026/02/11 12:51:10 http: TLS handshake error from 10.244.0.1:49790: secret "kyverno-svc.kyverno.svc.kyverno-tls-pair" not found logger=webhooks/server v=0 2026-02-11T12:52:06Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=53a94d45-12de-4f83-b29a-f026b1fd83bc v=2 2026-02-11T12:52:06Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-11T12:52:08Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=d975857a-f1e1-4355-b01b-6ee46352bc41 v=2 2026-02-11T12:52:08Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-11T12:52:09Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:253 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-02-11T12:54:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=efaab59b-4b13-4b9b-9ed6-f6c4b06fea04 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T12:54:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=8a2a5d28-8661-42af-b581-94d844abde22 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:02:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=stat-rep-rjzw namespace=stat-rep-rjzw operation=CREATE policy=deny-virtual-domain resource=stat-rep-rjzw/Namespace/stat-rep-rjzw resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=3ce403fc-269f-4606-ba76-93367293238b user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:02:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=gitlab-rep-anks namespace=gitlab-rep-anks operation=CREATE policy=deny-virtual-domain resource=gitlab-rep-anks/Namespace/gitlab-rep-anks resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=a4f9f3df-d06e-49a4-b528-4860494f335e user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:02:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=group-nbqk namespace=group-nbqk operation=CREATE policy=deny-virtual-domain resource=group-nbqk/Namespace/group-nbqk resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=e415c9db-5fa4-463a-b333-dead2e1a09f1 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:02:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration1-zoon namespace=integration1-zoon operation=CREATE policy=deny-virtual-domain resource=integration1-zoon/Namespace/integration1-zoon resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=90250d29-5dc9-462b-8c0d-a420308e12c8 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-on-pull-request-m5qhr-init-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f6a6b51b-00bb-4afb-9bd2-1610b4b0bcb6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:02:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-on-pull-request-xgjjd-init-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78055bae-d732-4094-a122-a425ea4b423f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8d319bc9-7e43-4aa9-a256-53fbb99d4a93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-lzkfvt-on-pull-request-9879z-init-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c97256c9-192c-4a3f-8adc-f81b20326d35 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp765ffd90444ae9cbdae70067c6e904d30fbf7f5593587a9dc4-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4f353227-d22f-4e98-86b2-8db43e48da01 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp8c41ebfb521bf03be3ad95791c5111c43b390d0c311cce5d5c-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0ca89157-62ba-4126-8fb2-55da6f54eb8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp47b0aa467b73d6c7dfd9c32641ccb6a530a5aa52c899208cac-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4ea5a1c-f0a1-438c-b1dc-c14a88c861d6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:03:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull40d30b6fb6a189300881f60a564386b6-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0684f2fa-8648-4154-b65f-ac6ebf146043 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:04:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g47b0aa467b73ffe4c243e1dd8eb41275925c9df32484-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=215a31c5-bb15-4b72-bc26-eddcbc1d1655 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:04:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-o706541c0c59ab504c4cd2aa7597325cf-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=237dc828-6297-4dcb-b296-f4c4853a9920 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:04:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-build-container-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c0936b40-b4f1-464c-b533-7524d5809f1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:04:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-o53070ca4c7ae001f145c4e3969df1c2d-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c528dcd-5c61-42d2-9d82-8a9c6435480e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen8c41ebfb521bf0f8b868c1b3fe129993209f554a685edb-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9fdecca4-59a9-41c0-91f9-ce9e10422320 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen765ffd90444ae9cde32aecc050ab92ce0a34052550b6d6-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3b58a966-616a-4952-bc98-a46e1a868950 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac47b0aa467b73d62eab8466c0af5639e0fb0eef702d8763-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=37c4eeb0-92d5-4b71-8f26-cb43ec4f63d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-on-pull-request-xgjjd-clair-scan-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1d4b863b-985b-4241-9c96-c3c4a09c4325 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-o2a672ae95c032f2a2c5537a0bc032862-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cef3590e-bdcf-4896-b5f7-dac312cbda44 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-o06ee951134e3f8a43c11d5688504f232-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=893e3059-ee7b-4377-9a13-990c16e1e674 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-on-pull-request-xgjjd-clamav-scan-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=54ea69c9-a698-42d8-9954-23f459cf5fcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes8c41ebfb521bf03be36dcfa1a222a7a8261435430e2ac68a24ed651c-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6e7a0a2f-ba3a-43d1-85b9-936f6e42ec07 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component8c41ebfb521bfe780a641d7af2f45cc745c120cbdad95-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=096d9a80-f4d0-4ad9-af99-c7f4bae9e9bf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone8c41ebfb521bf0360679978563a9138a63f7ebd5ad19070-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a80b00a1-7861-4121-b16d-2772210e06d3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-on-pull-request-xgjjd-apply-tags-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=61480984-c562-4cd1-9344-5e93c238e0d0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-o6a35d3b137fa080dbf50141608ec0c84-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=99310e3b-aeae-422d-b7fe-1885fa47b960 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon8c41ebfb521bf03b7c0266ae68ab283d75f3795ad4e42ab6-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dcf7ffcf-9827-4304-b55f-fcfedec9c24f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-on-pull-request-m5qhr-clair-scan-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4e619d26-bb76-4448-8636-fea8a57add2f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-o103540fb6a7a6db8552e237aaa1df146-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=386f2a62-20c9-42cf-99ab-ef8f7854756b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-o55246a697e55aa2b3566c4e77f8f2c36-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1ded6415-c3de-4ee5-be9f-6ffc35598bad user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:06:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-on-pull-request-m5qhr-clamav-scan-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d488dbcc-5b20-41c7-8c78-554cd0fd089d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes765ffd90444ae9cbdaaeb6d6141fae5fe8f9f4c726a1430d482cf14d-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b6655725-d17c-497d-a3a9-b833a36b7fee user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component765ffd90444ae0acd96a8a9b03732ef2e2ac6ae8d4598-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e2e5e3b3-4d24-4565-ad2e-f84d58a2f3ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone765ffd90444ae9cd68e6e38115b39f5c5fca9f9332e3241-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=66906f5d-fbf3-4c25-87fa-c637e2adeb76 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-on-pull-request-m5qhr-apply-tags-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bb5a830-6ec8-4d98-928c-d7fdf85e5ba8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-twejsy-ofb16efecbd02c893b2e6e1d3add72ae8-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4a89cbd9-9580-40d0-8f7d-8e1d23e58009 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon765ffd90444ae9cb353070d0ef6396fa7fa0d6019064ecdc-pod namespace=integration1-zoon operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e97749c9-0c52-4485-8830-f61f1269f6f7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-lzkfvt1fc565d43b562f1d830ca82515f0ddc1-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d375e71c-57e7-416b-a3ab-873422ccb711 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-lzkfvtade4be3d3e88649ff21a7b01003d76d3-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=40d78bf7-92cd-484e-9f85-e04f9157d699 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g47b0aa467b7379b74cc8c2560689a3ec7c64b63567e1-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=751ca19c-fe62-4903-90ad-80432a434356 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-lzkfvta7aeb25a781c424fb380c2ae3efee69d-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9152f1f7-a530-4112-ac50-29db065e3f25 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes47b0aa467b73d6c7dffdddc098ea6081ee1ff5c36f95b06a89263080-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e0cad843-5bcd-4efe-9ba4-84e1fcf54ec5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-47b0aa467b73dc0363b9887da4f771583f33764a856bc-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fc410543-f3c0-4bf5-b746-a6dfdeaacc9a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pa47b0aa467b73d6c60832fa4bcb716a97a78bc6eea3d4a47-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=20faf2b7-d724-41d9-a040-c88d1ed3a8ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-lzkfvtf9590623c7db70b7d65ae1b6e61611a0-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59e506f8-80af-449c-b936-8a7676cd08b9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g47b0aa467b73d106413a087c10fe467b3962aabfbfb2-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=67e03b93-a476-4e27-b0d3-436d3448194a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-p47b0aa467b73d6c734018311a485fc867832a49652714ac7-pod namespace=gitlab-rep-anks operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=13b04eb2-814e-40c1-b6f3-1a6e9b0b86a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-build-image-index-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64dd5943-b3db-48b7-8aa5-06088bede9dc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a254c727-1ce6-4ea0-a3b0-3d303fa86a66 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pulldf7dccc54409265a41602cd46d3a693f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7e4fe878-f5c3-481c-9516-5a30832f1835 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-sast-snyk-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80d53e4a-e987-4c31-908f-192290710bab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b57c1337-69c8-4dc2-bd93-45be9457a475 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-32fdf91a2f997e0a9cd370cf0efba4a434fe0ebf3bbacb9eb020ad40-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3ed1bb39-452b-44d8-87c6-425754e65df1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-sast-shell-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa581889-7cd7-45f3-8f31-033cd4c347a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull2e877dd3ad71c259519c6eb3b5b87c63-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8388b5b7-80e4-4f4f-8d73-2cc8f03f3e06 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=644e14d8-8205-4304-a71a-b2acafde15f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-948hh-push-dockerfile-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=02f29a1d-5c5f-4684-998f-0af5167aaf92 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:07:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull17332a771d98aaf919cd9366c59eb6b2-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3badb39e-a3e8-458c-9d83-e36140744414 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:12:58Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-11T13:14:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-utyi-task-success-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6981340c-fdb2-4e2d-9540-01300cc6652f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:14:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-utyi-task-success-2-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=753abcd0-9ae0-49c7-8e2f-fd72a2c4a64d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:14:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-utyi-task-skipped-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7cdc35c1-81ae-485d-a879-4826ff8a9d5b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:14:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-hlprto-on-push-f49s9-init-pod namespace=stat-rep-rjzw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e2c22d7c-c08c-4fd2-9d46-9f27557debb3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:15:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-zlztl-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=500efee6-3f96-4300-bc09-d3f7afde16a2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:15:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co7d49199bda871fcbb9af083336137be066240774d1e6310fbb-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c31084f3-23ca-4a4b-a0af-d4c83c6a71f7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:15:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-979349e630a8b405e14b111bc4361343-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=01a5def9-638f-4821-82f0-4df39e5dd1cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-f1bec866435743ff24ba6a1fa6b1608c-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=55af792b-50d6-45ae-bce1-2ca11cc33aa3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-zlztl-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4819808-fa2a-4fbe-9516-f821a7fc50bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-dbc05e2fc3b79a1d335406b669eb0810-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d0a5a13a-5778-4520-87fb-eaa339aaca8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-0ba4facf1bab465b515b8b241d0615ac-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea20b426-b1dc-4b22-875d-3c3deebd25a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-zlztl-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1f92a3ac-957a-4c72-b481-70f2a4d23233 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt7d49199bda871fcbb9aca7299263b6322fec06d7b9845106fccb4f0c-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6e76f2a3-c4d5-4e69-b95d-ad1eaa30c054 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-5e645f7364094adc9f423baef3f63aab-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a63b4df-8d8b-4f53-bf42-487bfbd65ad1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo7d49199bda871fc9765387032d47dc9c197a77f75c9346e-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea2f998c-6f90-4e0d-b6f1-dd27dcef1c2d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-zlztl-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=221cbc77-b8bb-4eae-900b-99ad67ca0507 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-ca6474858dd1981ccfed382ed4b0d225-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=57731a1d-554c-49c4-b804-2f44228931ec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp7d49199bda871fcbe4f296ce7d46f2787b13791c2134e069-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bc184afd-40d0-4219-a1d7-6eec7077aa53 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8c32b7e0-4d3d-4917-9e48-fe3274062800 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:19:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c41ee01c0c8f29e378e7d7f74204728a72-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f353fcde-4229-4204-ac1c-5fac64b2e373 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:19:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-prefetch-dependencies-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=74d01c6e-9ea2-42c6-8c3c-66c9b6ef2da0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:19:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-build-container-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9d796a3f-097d-4724-859f-d61964b14cf7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:19:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t48e2d4103a0c79ea655f04ff74251ec9a4598176ce2c6a1de4-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f00dcc1-76f2-498b-ab90-19b199a998df user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:19:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in48e2d4103a0c717bccd06694cda19cec6971515e687f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=edb8cc15-9143-4530-a47c-7a695a8d5f61 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-build-image-index-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=445e9896-99f7-4563-8df2-022dc54da892 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-48e2d4103a0c793af2576b3aa460649b4d8028f69c7219-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ff0428ca-b1f3-41c2-bd22-72d43f2d5f0e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5eac34b-ac8f-47db-96b8-92c68c7358e1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-dae0e9baa91cff2b4259125a5e1fd75d-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ecbd70e-c304-4d6e-8274-c4e101333e41 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-sast-snyk-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2f9311c-5eb1-47bb-99e2-17d44a951658 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3915b49f-de49-48b1-92bf-6ec4928d678d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyteed177c31b1da58777c71feecf820ac9d3eb2f229451df6e6a74889a-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a4cd53b5-1106-4750-b04d-ba30ee63d7f7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-sast-shell-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4bab2f6-c465-4c3c-bfa8-352a4d7e6afa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-sast-unicode-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d4b550ca-8cee-419d-a63a-3a55768d2601 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=62b4f04c-0586-4a6d-8310-bb076a540066 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-push-dockerfile-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a9f2eb6-2d5a-4a46-9b23-53a89954589f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-push-q6x24-rpms-signature-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f740a317-5da2-4971-b466-d19b731e5504 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra48e2d411937deac1673e6df6c9e734f576f9bcd-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=200a549a-625f-4c95-adfa-75f450a1534d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl0bde70a76ace032ef97b0dbe4ad391a9-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ffe505ea-9c8d-4046-8e5f-eae15d8541a5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in48e2d4103a0cd7f6a2f3b3a49bc60ca02a7d42e2b5f5-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4394ec9a-dae5-4d57-b56d-a585c9d363ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr48e2d410878b761ebe4487ca3cc2c8b78293dfb1-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aaa0fdb8-5899-4af7-92c3-e36c84d258b4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:20:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon48e2d4103a0c79ea65c2b51600bdfc881e00722c055d072ff2fa6652-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9c21cdba-0198-4a55-81be-96aef03ee520 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i48e2d4103a0c73d62a0dba2ce4831f257329f074ca356-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=02f3d7e2-aa50-464a-9ff0-f6aea5b45ebf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test48e2d4103a0c79e5ca457be84208964af73228f126654fe-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=31771c6d-4a95-4762-bc6f-1a1dea94056f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra48e2d41d4f3310af6dbb6cce514ae7e6cb0b0da-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c033430e-4259-4c07-9b81-0472e1e76782 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in48e2d4103a0c712692587915adcdba2152658709e3d0-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=be2a3de9-b96b-482b-a54c-1e6ce3088c01 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes48e2d4103a0c79ea8e48b011189d0ff3e8e90953a22c8798-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7b437bf0-d1c4-45c0-835c-e5a16603e65c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:21:21Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-pair\": context canceled" logger=setup/runtime-checks 2026-02-11T13:23:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-rjv2g-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3eed29ef-5bb3-4f3e-8269-fe2a89a392d3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=edacc0c3-280a-4883-8cb4-46eb38177e5b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cd8317f090ccd88713319f30f9f0e521ab-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=530c0578-9a13-4856-ab10-9209572b5a94 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co71330ce65851c7d12aef26bcd26b2aee42c02bd788f75c1d9b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dd4a13fb-ff00-4665-8402-17f4d59145c4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull5bb86ef910ee45ca20b7c173133090da-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7075126e-4171-42a7-98df-2b5cac18c0f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-td796d11b4b376cea4d506a7ee4f72ea3821648b60c016af009-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ac85568b-ca3b-4911-aeac-fd5e62b8225f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-d957636e7ae5e8827745774672f7b348-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8bc6652e-87e0-4a74-850c-5adc9c335802 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-build-container-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e6631fb7-d116-4a64-ba3f-346be7b0c367 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:23:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind796d11b4b37c1e6caa729617b2a16910cd67eb152f8-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=70b54924-fcb1-4124-87de-0788040bbe08 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:24:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration2-itby namespace=integration2-itby operation=CREATE policy=deny-virtual-domain resource=integration2-itby/Namespace/integration2-itby resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=019cb43b-ef7d-4512-a923-55039d981934 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=5ea293e3af25d62d2060278bb177cc1fa09bfd3c0ff8f5b7772d72867d26c66c"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-11T13:24:20Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-11T13:24:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-kc5k4-init-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=367b4f4b-ab54-4524-abb2-7c3f46d272b5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comped27e14238cbdacd178e34260b90839db20fc74015e13f4b01-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=45b11a2c-0068-4e94-b589-750b444c8074 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-od85cddba5341724a230a28f047da038f-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7a64d438-501e-42eb-a930-d5259c6c0e67 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-d796d11b4b376ca121d97807ba15fe02b1c4c2511d4290-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=04e3eae5-ff78-4924-a553-8ba3437fd66b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-build-image-index-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=14b86745-a280-4916-ac86-ea5c4991de35 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-fea28b69503787b6d952229ee16ddd5f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c8ac1bf-9588-4d8f-a9b0-b3945c8f375c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrad796d1134869a730f2fcfef32d48f108ac264ef-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=85f152bd-2476-4093-84ac-967af86c2c32 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl4d5878c8e5d1b44d7084b157cd0a22b9-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=75265e67-c52c-40b9-8216-84153825689d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind796d11b4b372b324dba2357b73f7f0a473a23ca1bb9-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4f47ce68-f737-41ce-9ba0-cd96a067b0bf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrd796d11b09a7de563d1c167df5a45073f6e7220b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d7432154-b4e6-4071-b130-11c305b88326 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kond796d11b4b376cea4ddb1b6a4e4dd08991c54bb63e1e084a38a78bc1-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03ebb84c-e76d-40f3-b725-baf713cffee3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-id796d11b4b376ca3e3002a3a893ae5bafe5dc6e4f9501-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1188ac76-bcd2-413c-a507-4010dd65f17a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-testd796d11b4b376ce8c1239698c39b1da0af89494129bcbf5-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=475bbcf0-7998-4102-bab6-40c4fbd32ae7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrad796d11d96ac67ea2b7f1134d0140adb39631bb-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1364bfee-a97e-4f7d-bbed-023c8eb66feb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind796d11b4b371510e7ae98c63849bc973ee16023fa95-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ee75648-b0ff-46e3-a69b-278e127dba1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tesd796d11b4b376ceacf34e00422b84a8c055095e85f320547-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ac154dc9-ad7d-421d-a447-e3896a66bb54 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7823bbde-918a-4f49-ae81-946889562042 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull1c726dfe074c6fe78f370aeee009a59b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9703a32e-7b64-4471-8385-baaf320d7ece user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-sast-snyk-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=38368d76-6c4d-45e9-a526-92c7f1d9522f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=707a7778-ba4b-488e-8b39-9dae094f5d22 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-72e685400680139a4e2b9c93abc38be5196fc6794d522b48d6b5129f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=289eb377-962d-49d0-8038-f3447eca8afd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-sast-shell-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4be18e3a-a66a-47c8-88cf-ed5afbc6a5d4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pulldd6479ef2ef2cdd543284db6fef41ec5-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bf9f939-00fa-4bf4-a4db-bb09a7198fbb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ca38c7a8-241a-460d-a42d-f0e5530cbabd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-8g5gf-push-dockerfile-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2595fc3a-fd67-45be-b304-8ef433b661aa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull8ab99ac68861c3990fea55e9ddf60dda-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a30428b6-1df2-4774-bc4c-d1eb53592fbb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-rjv2g-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f9c23f2a-45b5-4fa5-83d5-73ff85e27c43 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-53cb8e50e3fa283ccc2d22fbcfe08236-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3e3587bc-72d5-45fd-9397-4eded33c3087 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-fb6901093900b05d8553f3b38a1960e6-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c514b9ea-56da-415a-84a9-cb5e7d71d474 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-rjv2g-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=95501318-36ab-4d7e-ba6e-6c580b949885 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt71330ce65851c7d12af2302065e47299d529824231b8139245f12e0d-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=673027cd-a1ce-45c3-9d69-50bb5f9ee3e5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-665a6e83db0a70680975ed0cf32cab9f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=426ba46f-86cc-457e-a973-e5c87c169447 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo71330ce65851c7d1617f19318cedbc53c40be9f732aa8ac-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f1b4e92-dd79-43a2-a0be-51f7d84a44dd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-rjv2g-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=48b33eb9-d6b0-479f-9968-fdf58674be93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-37a5ce09e6ae886e4128d73deec6bfcc-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=de30c773-b076-4e0a-99fe-e2239536e75c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:25:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp71330ce65851c7d187ceb61445de089ff6841e75b5b98f48-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2d377330-86ac-464c-b575-cad324e441e3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componened27e14238cbda0d09af883437dec7a65720a98586753a-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e10363de-4799-4bbb-8fca-4aab2f8c188b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-kc5k4-clair-scan-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cd9e2b0f-9fc5-4bf6-98d7-1605d80b51ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-offfb8f6e305e94623fd535234e8d621d-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=11d7dffe-ca4a-485b-972c-64f7efdaad38 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-ob363828812632146d4f602f2d60aaf46-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=83f5f6d1-9dab-4274-8a99-2916b1247671 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-kc5k4-clamav-scan-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea57e819-3ffc-40bd-8d87-6fb558fcc931 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tesed27e14238cbdacd17b7f89be27ae0c0519da6e0d8b5d65a95653993-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=22cdfe9a-602b-4dd9-864b-871a6d12a08f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componented27e14238cbd56e20c748c658e7b5736671528d27728-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e07c6330-ce26-40a0-8364-8ee85ac8ceae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componeed27e14238cbdac4edcd07cf91f2fee1af06c17cdb426ae-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8adb0f50-149d-4c0a-8951-df6bd8821012 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-kc5k4-apply-tags-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a617d93f-1bce-4fb1-9be0-09f3aa0f7bc3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-oeaee632b6fa48d6e18cbae9547e3a9d8-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d09cb9c2-be1e-4c87-9b11-0bf99d9366d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:27:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componed27e14238cbdacd5862bafdc24de5cbcd1e0568eb235bae-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ead33dde-8251-4702-9908-0b90eb27cfde user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-p942t-init-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c22138e-6116-4e44-aaee-7c2da2fce5d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=89c12e15-ad4e-4c39-9ad5-86313d9bcfcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-q7xvb-init-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f532bc3-6515-4be3-9f13-1a4914760b6b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp4ad237aecaf740f684a2ddc00a778ed93f986881ef7eb7b217-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f761aa4b-83e9-4228-b675-bcb11eb6e66b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-oacb16d252768b759a07b6bb59fe3be86-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7388cd75-01a6-4822-91e9-313254690084 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull413e646cfda7f361330c6cb1905b2fd1-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=181d9c00-660a-4bd5-a0d7-f4005e0c00f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:29:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co1fb7547a37909c89d7d29f03c24ce4011227937f05c434684b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b74f9114-81af-4c1f-97da-9223f72df363 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:30:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-build-container-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bee2e06f-7750-490c-8872-0d332f227f58 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:30:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-66c43293f0ff7a8c00b05e615bb1b798-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=074c6e8f-bba3-4b06-abcd-2392b310c0d9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen4ad237aecaf7400e4c839d01a8d29b25dc76ffcec036ce-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a3de4df4-639a-4f6a-86e6-266d35fce95f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-p942t-clair-scan-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=daf80741-ce9b-483f-a07d-66b81821e5bf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-o3ad87ae58ee5f3a65eaf749d4dadba99-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c77cd96-0ced-4b05-a34c-a2d1373330ac user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-oc0ec9feb734a2aa1eaa7a4e8143a3348-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=001b12d3-91c5-40a6-80e4-257f1025001d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-p942t-clamav-scan-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c1f52aa-f52b-4a85-916d-4588abfbaac2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes4ad237aecaf740f68465d49089564f33869b79ffa433d0a4d6b57615-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c0e255ae-1e21-4265-9a27-a80635ced085 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component4ad237aecaf74c3e4be94c7f68198796b18244e8e2938-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=111a895b-6481-4652-a903-f12429c90252 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone4ad237aecaf740fca228e81cb13c351a2ae59a4fa59d1e9-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=75c88ece-f3a6-4fdf-9dbd-732e9bd54fb4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-on-pull-request-p942t-apply-tags-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=be16deeb-6d1d-42b8-b333-44912cf94308 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ynozhw-o6377944a8d4d1baea471564184a6ae70-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cdf86bd1-b81c-4465-bb16-e5ca42b0ef2b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon4ad237aecaf740f6973d5e78aa02d4a71c95ecb38edd15de-pod namespace=integration2-itby operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=373ec194-f5b9-4d81-92b5-92d4feea8dea user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-build-image-index-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f42f287-77e3-49f1-bea3-0e42e67d3a64 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:31:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-441550c7df6b946208e841407812ed90-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d7d98ff6-4406-4dde-9f25-4f54ef9ae1af user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-q7xvb-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0e6cabae-34ef-445b-b4e7-8d8e37fb6824 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-23ee8d67b54058b8d3d9c3604d58b9f1-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bf0099a1-5617-4561-8eb6-3d050fb108bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-ed19513ff4945da56417a5a1ba52484b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=781f4fb2-6582-4bfb-9102-bd8987f367fe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-clair-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=36fc28c5-9062-4098-840e-c5babf9c5730 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-q7xvb-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=af1dce08-36ea-4d15-85ff-032e82499147 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pulle296c108fe91201a9afe2a7bbd3f509c-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e94246bf-a823-4ddb-909c-53182a8a1692 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt1fb7547a37909c89d743c9c1b07718bec4275d694eb14490cb5828df-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4cc09a83-eafa-4113-a9a3-a21101534082 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-sast-snyk-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=efbd5856-c258-4f0e-8734-7d38287d5370 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-1b1228509e74c48fbffc8f2cb0cc5a1f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5b86d93b-cce6-41ce-baf7-07947cf596b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-clamav-scan-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bed78657-c596-4862-b92a-7582810f0405 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo1fb7547a37909c8bc62df886802f7a0f46688567f57e81a-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7679e870-a22e-42e6-987e-79807e3f0d74 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-bcbd7089fff51f61485ae67874485a6f9befe18737bbd28537d6b762-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=989b9094-6294-4946-af88-f08c2be2d606 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-pull-request-q7xvb-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fde4f9ca-cb1e-40ba-8b6a-a1d299ba92e1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-sast-shell-check-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9ab18210-ddae-4135-ac34-96fece002e65 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-mlrgkd-on-6a96827edd66ebff1f779e4ab7ffd28f-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9bbe97f7-465e-4643-ac10-6ca57efaf8a1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pulld9e05cb7caef8c845886675633f3873b-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=979001fc-8e89-4b7e-b35b-6c7a4d82548c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp1fb7547a37909c89066ce6a3f8e56d351119c060292f7978-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c988022-f562-44a5-b853-66cf6f09e6a6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-apply-tags-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5e3658e5-aa56-4cf7-921a-4dddd66d4b5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull-request-784sk-push-dockerfile-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2714d18c-aa5b-493a-878f-cef032586379 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-11T13:32:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-luvuvk-on-pull8e2347716995c5a217edfdf5ea79c4d5-pod namespace=group-nbqk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b706b1b4-9f70-4273-97ad-ca351cf8f754 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eb74f959-5e20-4b93-bc46-dd3fd352620c"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["cd71e579-13f0-448e-8bbb-5dd4527cc874"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-x88wm"],"authentication.kubernetes.io/pod-uid":["079b1d46-4e6a-4ce9-903c-3396d162e604"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"4e2789c3-53f9-4a2a-870b-c9f293dc0bb7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2