2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-15T09:53:28Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-15T09:53:28Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-15T09:53:28Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-15T09:53:29Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-15T09:53:29Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-9s5b7 logger=setup/leader-election v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=55a20c85-2e24-491d-9847-230b9337b719 v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=0cb3b726-5e20-49d6-a0e6-0f8824c9a004 v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-15T09:53:29Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-15T09:53:29Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-15T09:54:21Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=ac3ba29a-029b-450e-91a7-5a88db47eb2a v=2 2026-02-15T09:54:21Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-15T09:54:23Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=d5cee84d-418b-41ff-a641-de1c649e4988 v=2 2026-02-15T09:54:23Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-15T09:54:23Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:253 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-02-15T09:56:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=5a658353-2f10-4576-98de-83e31c6f225b user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T09:56:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=0777dd64-f39f-4059-ba30-b4ef2233464b user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:03:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=gitlab-rep-rfaz namespace=gitlab-rep-rfaz operation=CREATE policy=deny-virtual-domain resource=gitlab-rep-rfaz/Namespace/gitlab-rep-rfaz resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=e0b90cd9-eae8-4122-a503-f761bb050a83 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:03:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=group-ymcc namespace=group-ymcc operation=CREATE policy=deny-virtual-domain resource=group-ymcc/Namespace/group-ymcc resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=ea682c39-3798-4b53-8b31-1feb281cdce0 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:03:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=stat-rep-pjxi namespace=stat-rep-pjxi operation=CREATE policy=deny-virtual-domain resource=stat-rep-pjxi/Namespace/stat-rep-pjxi resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=0c27ae94-1435-4937-9710-8473de55a194 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:03:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration1-rlor namespace=integration1-rlor operation=CREATE policy=deny-virtual-domain resource=integration1-rlor/Namespace/integration1-rlor resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=684d6961-fa37-450c-93e4-619194900dc9 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:04:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-fkfgh-init-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=12fac797-06ea-4455-81fe-e8275f793093 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:04:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-on-pull-request-vn69k-init-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ffb2bb9-99b3-4dca-aa03-c0b0a852dbdb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:04:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d17e7509-45cf-442d-99a5-902abc64936b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-aqsagl-on-pull-request-bjdl7-init-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9579351b-4026-458a-8d56-8616905039d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp6bebf1c4c1af6e3c71a4515ce73ae7ee816d74191b02245cf0-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=132bbb4d-18f5-4603-ad97-433ba8829012 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp83a081a375b94c8bcbb26a815fb2bcebcfd920f7bbf2fa259e-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1a34579-41f2-497b-a6ba-3c8be9deb5a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull4fca7ebeb786a24bf0ed4cb666556c1d-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=63455cd1-adaa-49f4-907f-9e40959f0155 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compad5df649a1a0a2e2cf8b058c632395940085a2fd0334d26a0c-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=494636fd-bbe3-4632-a42c-e63c98ae5f25 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-build-container-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=48390f78-667d-48c3-85f5-6cbf09b857b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-o9259619ecd867d4b3e480a79336865e4-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=adb8286d-92c5-49aa-8124-1446f1d452ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o84e6cf769d1cb497581c6559d87f5e88-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae56072d-5c63-491c-a047-69635b1aa378 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:05:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gad5df649a1a08f2480ea78eb09402b754a638c4c5c6f-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=99835b28-3583-4477-b41f-387eeb94abb6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:07:27Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-15T10:08:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen83a081a375b94c50ce433284775e7c0af0245aa5590ecc-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=858d8a99-eb48-429f-a766-6cc60d283610 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pacad5df649a1a0a2849d117c005a7033de70a0b02f1e7b0d-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a6e4ad19-57a1-44e5-bb8c-59769fe872d4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen6bebf1c4c1af6ebc1267556a187a622aa29a2891c4d598-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0eb6aa44-db3f-4c7d-84f1-93f8c98de2c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-on-pull-request-vn69k-clair-scan-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=39a54d92-42f6-43cf-81dc-9a00b922a6f5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-o68e5f5137a034f884ebaeaf3c458c1bd-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d27a28bd-475f-4811-a0b1-365485b4a196 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-oe9c3693a4db6d9a6ac07f5bfbd0818c1-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=20452a56-30f0-44e9-86cb-555b7f6052a2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-on-pull-request-vn69k-clamav-scan-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7568ca1c-636b-4f87-8ef7-40f045f1451a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes83a081a375b94c8bcbbb40f5e95c36af26d3f12baefb28023d2f61bb-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aaa904fe-38db-4a7a-be6d-94601e4acbc3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component83a081a375b94e33ae2e33fa14917d35cedde8e74b4a1-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0d055937-a52f-4fce-a2d1-4e51e020ac24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-build-image-index-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=75ce4d8e-e275-4cff-8849-2dd037eb935c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone83a081a375b94c86b5adaf5c58fd1fd65aa80a181eb877f-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fdb5dbb4-1958-48bf-8c77-58bca437db68 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-on-pull-request-vn69k-apply-tags-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b7d1c43c-d850-4876-b9eb-1ecfbec07bf7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-o8aeb996761f9c96ec5efaa21c0b765d8-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2cddaf21-2685-4197-99af-d39c2fc1ee59 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon83a081a375b94c8bb95db55ce8f9c062d3b9b5cd3a718a97-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cc4949c3-a2f0-4577-9ffc-a7c6859f4175 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-aqsagl40c1447ef210f15be5eb05407b2a01f7-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a60ff203-d69b-4ace-aab8-a1cd024eb2a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-aqsagl5429f484e821bde1faee0641b40d6fa0-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f58fbaa7-c19d-412c-8695-552ab3bff55f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gad5df649a1a0cd81b0a6bbc83d772d633bb6b0d67fe4-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4d76ae6-ea7f-4605-8cb9-e5982b0f9a5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-aqsagl5a2aeabed958d883960e107ba004af5c-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=82088515-868a-40d5-8b33-fc2a213044c0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tesad5df649a1a0a2e2cf098aa520b8d9812f9b14e651fdabbe921618fe-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=168c7182-2329-4a87-b0e2-36c5f24389fa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-paad5df649a1a0a2efbf6094a9a6a3094c9a9aeb526b18522-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee5420c7-2e0f-4a1c-ab86-73c5b265e0f5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-ad5df649a1a0ae310474ca89c9c7e4d771583c676f504-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=04aeff8e-dfb3-463c-8b76-baf7eea0ae6e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-aqsagle5d442a324961b434d3635e7ee2b94ed-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9180b3db-a0c2-45b7-bc87-584cbdb6b0b6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gad5df649a1a0c57a31604cb5c7c893df57ef81794a3a-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=16a1eebc-a49f-484b-9165-d923dc5e7165 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pad5df649a1a0a2e2b68c14007064cf645e8601e2ff7cf024-pod namespace=gitlab-rep-rfaz operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ef39b0ec-c6f5-441d-a78f-c96b729eb387 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-fkfgh-clair-scan-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4b24ebb-567c-44ac-827d-d0a2fe7d2fcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-of4e14b1c5f18b9a9235a5f683cc641f0-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3a0bdff7-a14c-46cc-a316-dc0ac9397f76 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o038b2c07ae127c2440b24b2024475575-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3192bc10-34bc-4834-bae8-06d725dade69 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-fkfgh-clamav-scan-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d741e2a0-d9d8-45bb-84cc-c9640af86c50 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes6bebf1c4c1af6e3c716925d570c55f05d0e25124fefae2286d4f1129-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=17bbd801-157e-46ab-9eb1-1a98265f6f2c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component6bebf1c4c1af618a56e0351cc2d90657552192a1ae393-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c095524-1165-46c9-a4d8-87aa25fb4009 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone6bebf1c4c1af6e34ad8813576e1687358772344b964cdee-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e8b4b023-ccc4-4a80-8c2a-5f79578f7238 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-fkfgh-apply-tags-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ce6ae446-5214-454c-94d7-413162059d50 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o8ca8ebd70c6fbd9b82df67b6c29076d4-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=467e1399-0240-4257-adc1-0b4c889f7299 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon6bebf1c4c1af6e3c9af4eac0492063d4d6730b3433198b93-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=219c1d62-738e-46b6-bf80-d8135cb2ac37 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8dfd6fdd-94fe-4fa4-940f-16fc59d85d27 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull54f64149f0fb85de8643bce1c29312b0-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b825dfa6-3149-4bc1-970e-070d569936c1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-sast-snyk-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=79bcdae3-0c41-47ca-9c12-f27e589546c3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b52c6277-603c-438f-86ef-612264e9b4f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-c6de0985844870d765e10f9ac62a047260ca8afa52393807ed7f106c-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b44d3b0d-fcbd-4ae3-a8b4-56ed50c6317c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-sast-shell-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f3b80bcd-038d-4921-8c45-9a25fbcfaed9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pulldea967d908f455ab9a90b8061c657af3-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ff4661c9-8690-4f64-b072-5f87096e61d3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a659f148-b848-4df2-a22f-a05c74a64cc9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-fqz45-push-dockerfile-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=809aae1e-d27c-4c0a-add7-5f480de501ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:08:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull0c7cff5bde0533a513b54c3c46dfa946-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1b16189-1eec-49a9-b21e-63166f6e2b98 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:16:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-2ss42-init-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8d273dee-ff21-483f-b65c-774692659472 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:16:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp5e3fb8c6d9299c8fc0748c72542d3c47310e9029c0f8ba6a1f-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ce30f835-66d4-4743-be13-1d47260f6d05 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:16:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o8693d6e4c4f02811240a1c769bb000fb-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a4c8522f-769e-4c38-9a77-449250982f16 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:16:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-4m22m-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f296eda-92da-4071-bb63-b17976357cac user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co877d6981c222fa7328b0f320193672a0b8e5b8869f30ffea65-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0161d5bb-2c7f-4dc6-b1ef-87933b1e16ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-161b98970222a340bf8c0419b0bfb4cb-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44231e6f-070a-4588-be83-27d2f8d34cde user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-kisr-task-success-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c1f1a21-f30b-4956-8f9f-d8b92cbcf673 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-kisr-task-success-2-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cb907a7b-a10c-405e-832b-a10ed8764d1b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-kisr-task-skipped-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5ce66d14-a8dc-46d5-980f-b9eeac224026 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-on-push-2dxhb-init-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b77fa769-99cf-4828-a0a8-7b346f138a9f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen5e3fb8c6d9299c7ce045f1df72ef6039e1f85381d085d4-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44ef5697-487f-4e6a-a390-e6192c565b01 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:17:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wsmvsu-o0bb715d75676eb3a7f17fb482eb9c938-pod namespace=stat-rep-pjxi operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3e280730-b9e9-4e11-86d1-392cae13bef6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-2ss42-clair-scan-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ed039daa-0f96-4d53-b98b-412e2fd984e8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o70f8e4a5f130a78909d514f14b2faf48-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4fdbd8d9-8eb2-45ae-814e-8978c4ad7bf7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-o91d8ec504627f955fae608558c54a96f-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=25592056-4593-4428-a297-d9f88ddb19c5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes5e3fb8c6d9299c8fc06b879a4eaa4dc4468be06b3aa00a8111533848-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=556e466a-70d5-4d73-8598-0b7d8efde68a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-2ss42-clamav-scan-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3d74c901-a9bc-40bb-8300-b1b48ace7aeb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component5e3fb8c6d9299f2e75592e075876f43d6a1fe3b9f0134-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=27c5151c-8366-4c13-9f59-99f5646ad498 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone5e3fb8c6d9299c88e4ae8e19cf6e754a899241b88a7f2c3-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e745189d-52da-439b-a45e-fd1181c68bb1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-on-pull-request-2ss42-apply-tags-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5f889f22-d22b-45e0-80ff-b443027e082c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-miiwof-oa4cba7cf9670a7f034586c1a0f55f89b-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f5bb8207-ed44-4f97-aabe-65344414d6ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon5e3fb8c6d9299c8fe598acc2c9d0b063f912679d27bfaaaa-pod namespace=integration1-rlor operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4cb87dfa-d6d4-4bdb-9396-0f258109dde4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-3478ddacdb849a9f22a1f4806b869919-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=53d69a3e-9303-49bd-9f6b-841b23e7e278 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-4m22m-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=40fdd30c-0435-4f77-b7eb-f81a2deccc4b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-97b539b81c2aabc7be00820dc65d7d5f-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd8c54aa-06bc-4863-871a-a59fb736e8d2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-a9cea6b6b9ba73089d876409b2bfd30d-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d6d7c2ca-9a20-4775-9e55-1bb7f728574a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-4m22m-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2f0df18c-94a5-4e47-ae34-652b3280bd64 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt877d6981c222fa73283629572c5d4ba2448a977314f64a4148ff8338-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03234f86-09a4-4586-a0a2-4d28bdbbbd06 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-3be042b879fb0e475e5cf9651cda4f6e-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=880f0565-7efb-4927-87bd-3110376e79a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo877d6981c222fa7f50f6bbf28e2acdb49727a498e66b4ab-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b5f308a1-f61c-465a-91e2-6b943aa2e208 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-4m22m-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=76ac638b-c240-49f3-8471-f6fe36680ada user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-c8d5b0ee5d10f7d8a896e5aed18f389c-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d7898733-d799-4264-b665-f46b6999864e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:18:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp877d6981c222fa73221d1016bf92f77d8a0fc0999d6c0d7c-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b0f9dca0-5983-4556-9e76-9b2908ed7ec8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:20:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c6f7167c0a57d7d5734b37f731cb52ef27-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=324fbbc4-68de-42e2-b51a-d10e1878734a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:20:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t6c416093173caeeecb83ebceb66661d65bb5ba55c3635032e3-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=afa8ce65-658a-4fed-8828-3eab49b1313d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:20:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6c416093173ca5ccb4845bf5d19ebc13655ef80e9fbc-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f9d6e93-7258-4639-93f4-bdcf565b899c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-6c416093173caeec3a755c2f4d697c5bcdbdb996c47528-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1cdf81c8-43ee-44e4-8c61-e5494024779a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra6c41609529a2d8eea38add8bf234cd6ee76fe0b-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59f99656-3297-4f06-9d85-91181197152c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl1340e2f3810e97376b673c32953804f2-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ddbc7d9-334c-44be-bd59-264039a65b14 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6c416093173c8496c35d8f0d25a4e010a4aa9b8a0b04-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=25aa83aa-cbe5-4947-b9e8-78daebacf077 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr6c4160930a6ba675a72efc104ed1acfa584bbcf1-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bde1bcfa-8026-45d5-bf45-12a871b500e4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon6c416093173caeeecb989a9692c93689e485012dae269957d86e7705-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=033f1210-a7db-4fce-bcc0-8f179440fa69 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i6c416093173ca89415367d9a5080d1a8acfcd6fcd1ecd-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e01da922-eec4-40df-940c-f8711fbf07a3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test6c416093173caeeea6d1bd19cd5c9926b3629defcb3bf9a-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2e140758-275f-4be5-ae28-f02854228cf4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra6c416090b0a4ad99b9a6e6d1c610531a47e4e46-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=73edf050-c4ce-4605-9af6-69a201bdc099 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6c416093173cc3ba54bbb922cbdfae303733de7a620e-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9995756e-edd1-467d-9247-37ead5b5734b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:22:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes6c416093173caeeeb75f60c63f592addbe3fd6c2170467f9-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=29c85782-ca90-4da1-b098-478625112a6a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:23:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-9p5hx-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d85ec558-4b7d-45a1-86e0-91f52f6cb500 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:23:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c644b91ac71e290c4f32d042938c6306b6-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eb5e13ee-6613-4599-8c2f-f3aee8e1a182 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:23:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78df38a8-c8a1-47e9-a9d5-09233e611a1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-cofe775f166dbf5ed89084b09dec2646aa0e7830b348d2b723c0-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c6a0c76-ea37-4a7c-815d-7aaf7ed983a6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t6545484ea140bd39d487da32b52bd8db3c029c14e0e6bb89d5-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9b020197-1b50-460a-8417-f3345c855ff5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull51797dc4a37563f57a077112bf3f80f7-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=909b0adc-4193-4319-ae3d-4416a7102456 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-d628d6962d78a4608520d5df1e2d6bd8-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d91237e7-07dd-40a5-a1e0-faae8a5e9e46 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6545484ea140897ff515a1497efc8657651b73e60937-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a7b81e14-1656-4d7e-8f6e-a602e3f9faed user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:24:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-build-container-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0c521904-4993-400f-aa76-cc6bceb51f30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:25:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-6545484ea140bdb237e5c0cac559bba5a62f14f4390422-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e8042c28-2046-49d6-888b-83e0a44882c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:25:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-73b7f5442f293e64e7290c4d1c46c507-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0c0f49ac-f643-4f0d-a7c4-6bac587440af user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra65454842fec7bbce9b735484510a6619593d192-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1c8dcb3a-2fdd-4243-8933-37a100c594c4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl06275a56935e9d04757169d957d74547-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=11521e24-20c1-4e62-969d-65ed8fc8a0a9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6545484ea14082f1c997a82c25f0abf41d6954368b81-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f630988b-f9a5-4737-bb28-849e982bc74a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr6545484e6b52be2bb00f2bd722227d6f35f9f0b5-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1ea21bca-093e-470a-81de-707bf9412e5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon6545484ea140bd39d4458ef93e24c32f1e8daccfe315f3b110f1e92f-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9a6a321c-dd4d-428f-aafc-d3b389ad3a31 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i6545484ea140b524e48644b3471ff5b4d95a54d8d64d7-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=20ac337c-5e64-446e-8c27-5a15b4b9873d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test6545484ea140bd3a6c6a8f41b2672ee6a1bcfc41bbd16b8-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8ee71f1b-02ab-4317-a2d4-28d6f5b956e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra6545484f49591c7298f3f91903c38937201bfc1-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=86631297-d3ac-4582-a8dd-1f636850df9d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in6545484ea140a1dee4359aa0d820d6b8ee4224d8a729-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f3fa1e1a-e2cb-4377-9f00-24821eb8b808 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes6545484ea140bd3901c9c34f8e4024857c6fb4a6e8f01e0d-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9ed6e241-fce0-4b39-8221-25639d7b3a0f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-build-image-index-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=79b3cdba-6602-480b-8667-d84a4d7b76f9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-9p5hx-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c40222d-93a4-4890-ac65-ab7c3dc915e4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-39d37192769a30353ff1d170e164e1a4-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4878c47-e5d2-46cf-b831-0081f49c97da user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-0984d86eceab8f67f0a5286023d4e3af-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=89e98b7c-4ba7-4bae-b922-91a9bc51cdd2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-9p5hx-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=94ab2ae0-6d20-48f9-97c2-c92b6052da47 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytfe775f166dbf5ed8907053b0ed5515f56cd677839869aeff580477fe-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3932eaf8-aa3b-4671-ad97-656db868a6c8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-f04996d649ee8ab8e774408738a86cb5-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=de58a727-e0c3-465c-b996-aee280c0f661 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compofe775f166dbf5ed9b7a3d8737d0346c04ca89ce45125ad4-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=91cb1ede-58dc-4c23-a4c8-f8ce3bb2ccf1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-9p5hx-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=500e3016-e337-43a0-8d51-2039ed6fcaec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-9d7bba2de98efad5a5fa9ba6b87b94f7-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a11f1c73-3910-45d2-91b3-7a9434152eed user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compfe775f166dbf5ed8716a2aaf8943c9375b6d29061f9c1f33-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=73899899-8bfe-4be4-bbb0-ba8dc336ab92 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=34d58b89-3005-412c-9292-f77870fb3fe1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pullac3a99321e8ebdb5b7bd718b891351b9-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5efaae81-5847-4857-bd6c-41f791bc1376 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-sast-snyk-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4461886-82f8-4d38-91aa-76c1e3ef97e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dc801e09-9d28-4bb8-a4a4-7fbaddb71703 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-ebc46db325365ed6151bce4edb8dbd6fad76626305b2655aa2647c15-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=76d7c850-9aee-46c7-b928-9398cb957018 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-sast-shell-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f4032f57-cc82-4381-95dd-68629f7b5ad8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pulldb3bbda60a62474aeecad78988feac55-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a01dd5fd-ac0b-4e17-85aa-27b77e8e515a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f643597-9b43-403c-8c3e-f12d32459d86 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-gwtw6-push-dockerfile-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b9dfb7a3-e329-4ec4-b66e-d7820e24fdd3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pulldf84ae7a4ab8c3551adc3c8f692f6a84-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c35cd232-ad38-409e-9f84-87346b6c5085 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e0de3f5f-f4b6-4c5c-bef6-264efe037ef2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-wz5t4-init-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=36b8a20d-66a5-4ac7-b48e-9913ed5c52aa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull4c67547ca7f2f2af8766a16168a4ade2-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bd59e20c-af79-47d8-9e26-730d09dd4226 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-coc5901614e40b6cbe067a0ffb1b372459457ff887768c1fa596-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2408dd89-0be8-48b0-8fde-0eb4ffc2fe44 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-90a4fecfcb16a9a8710e1fa4dfe18354-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b642606c-18c5-4cf5-9013-dba81d00f104 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:29:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-build-container-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=28943e86-4059-4188-8adb-30d1cb1fb167 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:30:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration2-ofpj namespace=integration2-ofpj operation=CREATE policy=deny-virtual-domain resource=integration2-ofpj/Namespace/integration2-ofpj resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=5efce8ea-6596-45f6-b8c4-730d62aff093 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=a61f80085b03f130fce7f760733c2d773f190320478029a7775e322592f493e1"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-15T10:30:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-mazlql-on-pull-request-ppldq-init-pod namespace=integration2-ofpj operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=960539e1-b2d3-4783-a34a-0b020ca62169 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:30:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp30a1dd62061100d466318b6cad04068901d3474f00ec0d3cbc-pod namespace=integration2-ofpj operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7b55bf51-e67a-4c7b-b249-5abd79634143 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-mazlql-odd3f4854833fd0f4935294f3d91e6e1d-pod namespace=integration2-ofpj operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f99cc96d-09c7-4f56-bded-26c67df59f40 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-024956a396de1c163fc368dca0c05a83-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=77359786-3f8f-434a-ad5a-1c18e3d28403 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-build-image-index-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6fe2cc38-a757-4832-ae8c-f9277fe59a59 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-wz5t4-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=364bfcc6-4cbe-40b7-838f-90cf027eae6d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-cca96268803a4c1545e824c16fa5dede-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1151619c-8701-417f-8ed0-6c77dbaaacbf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-4a96479d3762809b5f74dda4d4e10480-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b2d406a1-f29a-43ee-ba89-e8ea026b7261 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-wz5t4-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=65d0cbff-ab19-41ca-9211-a052b7b4e667 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytc5901614e40b6cbe062c80ee1bfbd2fa237b79ae3af80148b3c25ffd-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c055f545-276d-424f-ba1c-07d5a4150753 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-eb5e803f11058d862ae912a3c6c3303e-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f7a57bf9-b1c3-479c-9848-dc646393e406 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compoc5901614e40b6cb6f66c67b4de1f635d95922b16f8983ef-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=50f6833a-19df-44ba-a9b6-38b703c55e78 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-pull-request-wz5t4-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d429f051-a4a5-46c7-9169-2aa1bd43eed4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-zdrqwl-on-41f26f33048cf73d4d21367fc10a2a71-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3d5fcd23-785b-4020-8241-6668697f4e21 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compc5901614e40b6cbea755e443a0337b3c03d82ac36401eac0-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f211b60e-23b9-47d8-bdcb-9c2e5a73495f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-clair-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5a5eb8e1-15c6-4989-a331-609db5771555 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pullb66b8cacbaa74708eadd0d18a93b068a-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6b3a1cc6-697f-4327-ae52-32a536832ff4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-sast-snyk-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9f91e463-58ff-4a52-aa49-a707e62ed377 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-clamav-scan-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=835bbf86-8047-4a5a-9e64-6ce67dc0e248 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-cae5790d2d049d0396edd3fa54529c668df32dd6cfeaa6b7455e433b-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b57cef87-f3f0-42df-9781-13aeba091f68 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-sast-shell-check-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a9ea7270-e0a7-4971-b0dc-9775e8f7cc60 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pullc4b0cfb445db865234e4aae6ff17f5dd-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d43d9212-fa74-4927-8b28-e1c8e252547d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-apply-tags-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ce9c0c1-9550-4d93-acbd-207585ad721d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pull-request-wkgw8-push-dockerfile-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cff2fd77-8400-484c-8164-84663747f03e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:31:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-yrwdsg-on-pulle876212cf7fd9b4b3cbc2574e3f39e80-pod namespace=group-ymcc operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=149e6583-b08c-4190-94ff-8143b40c755c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=1b69639e-69dc-490a-93c8-d39e721b1d36"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["2f8c03d2-f574-4c73-8756-1dfb9fe35fef"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-sn75z"],"authentication.kubernetes.io/pod-uid":["fef48bc4-10ab-49aa-b763-151da12c5463"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"f227c129-31ce-4f4a-a543-9ff497174ea9","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-15T10:32:44Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-15T10:32:46Z ERR github.com/kyverno/kyverno/pkg/controllers/webhook/controller.go:469 > failed to update lease error="etcdserver: request timed out" id=0 logger=webhook-controller/routine 2026-02-15T10:32:47Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:452 > Error retrieving lease lock error="Get \"https://10.96.0.1:443/apis/coordination.k8s.io/v1/namespaces/kyverno/leases/kyverno\": context deadline exceeded" lock=kyverno/kyverno logger=klog 2026-02-15T10:32:47Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:299 > Failed to renew lease err="context deadline exceeded" lock=kyverno/kyverno logger=klog v=0 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:90 > leadership lost, stopped leading id=kyverno-admission-controller-877795fc7-9s5b7 logger=setup/leader-election v=2 2026-02-15T10:32:47Z ERR github.com/kyverno/kyverno/pkg/webhooks/server.go:316 > failed to start server error="http: Server closed" 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=webhook-controller v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=exception-webhook-controller v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:50 > stopped logger=admissionpolicy-generator v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=admissionpolicy-generator v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=global-context-webhook-controller v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=celexception-webhook-controller v=2 2026-02-15T10:32:47Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=certmanager-controller v=2 2026-02-15T10:32:48Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:124 > terminated logger=EventGenerator v=2 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=kyverno-events v=2 2026-02-15T10:32:48Z INF github.com/kyverno/kyverno/pkg/clients/dclient/discovery.go:103 > stopping registered resources sync logger=dynamic-client/Poll v=0 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/controllers name=policycache-controller v=2 2026-02-15T10:32:48Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=global-context v=2 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:566 > Stopping and waiting for warmup runnables v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:571 > Stopping and waiting for non leader election runnables v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:575 > Stopping and waiting for leader election runnables v=0 2026-02-15T10:32:48Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:583 > Stopping and waiting for caches v=0 2026-02-15T10:32:48Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:587 > Stopping and waiting for webhooks v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:590 > Stopping and waiting for HTTP servers v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:254 > Shutting down metrics server with timeout of 1 minute logger=controller-runtime/metrics v=0 2026-02-15T10:32:48Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:594 > Wait completed, proceeding to shutdown the manager v=0