2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-12T12:52:25Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-12T12:52:25Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-12T12:52:25Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-12T12:52:25Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-7lcx6 logger=setup/leader-election v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=be540279-309e-4b9c-92c7-89ae24ae7ee8 v=2 2026-02-12T12:52:25Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=f67ab6ca-3635-4a51-982b-2f8bb4a1492a v=2 2026-02-12T12:52:25Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-12T12:52:26Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T12:52:26Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T12:52:26Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-12T12:53:20Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=58bd9a03-03ff-444f-b429-af067498a534 v=2 2026-02-12T12:53:20Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-12T12:53:22Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=5b20176d-c1c4-4db5-b56f-a029aca4cbb3 v=2 2026-02-12T12:53:22Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-12T12:53:22Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:253 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-02-12T12:55:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=1ea5e084-8318-471e-bd70-ecb824263a58 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T12:55:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=bad42bce-ab0f-4eff-b715-90c7142bab80 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration1-czbd namespace=integration1-czbd operation=CREATE policy=deny-virtual-domain resource=integration1-czbd/Namespace/integration1-czbd resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=beef9a32-cdef-4d81-8d47-80a8e8350376 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=gitlab-rep-yumd namespace=gitlab-rep-yumd operation=CREATE policy=deny-virtual-domain resource=gitlab-rep-yumd/Namespace/gitlab-rep-yumd resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=f3c40ea6-0d21-40b7-9615-e8de17a30111 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=stat-rep-ftso namespace=stat-rep-ftso operation=CREATE policy=deny-virtual-domain resource=stat-rep-ftso/Namespace/stat-rep-ftso resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=5f32b691-e8e2-4f67-ad75-4018b329123d user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:03:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=group-eukw namespace=group-eukw operation=CREATE policy=deny-virtual-domain resource=group-eukw/Namespace/group-eukw resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=c152b3f5-b1b2-4671-957a-cd9d40abd5aa user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:03:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-on-pull-request-z2mmx-init-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2b7cc4ae-20b2-4474-9049-17c42d66a48a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:03:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-djdhsv-on-pull-request-fpj2k-init-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c631678-b151-461a-b63d-177b908d9fee user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-on-pull-request-ssh5d-init-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6262d85a-559b-4b84-984e-7e27057f8de7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp29dca546ae6c655d4c9ce9f560d56aa1c8658d1cf48cf48851-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=46915800-108f-4370-94ef-7a3fc0bf96b2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp273624a65f85948a3b5939a1e3677512590c200b52186d91f0-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d9b90004-6913-443f-94f0-eed9d3f057cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e3562e0e-c547-40b8-be92-405145eacd9a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp69186698b94ca27247a21d77a0fd623ad444fabb82ed6b2206-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=089fb57c-44c6-439a-94b8-44189f2a18d4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull167fb040670fd8fd5bd33571cb83620e-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=036ab307-6c96-4e6c-a6e0-147a731374a0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-ob73d773e7b3ef33dd69c5feaf2037ec0-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=04457586-85df-46ab-ae07-17fcef2fba12 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-o6488ea2ac26890743a0a01e3063b05db-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=43d6479c-0555-49c0-9c0a-4af5f4945dbc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g29dca546ae6c97eb8950a7b1367e7aad2daeea31012d-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f9198774-7c9e-447d-999f-8569b0e09b3a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:04:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-build-container-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1135707f-3e90-4d4f-ad0e-64a28f332a8c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac29dca546ae6c6555347c7b1eca374674aaa6449c587f27-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6817fc35-1f18-4cad-8de5-e300f3168782 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen273624a65f8594b8f4786f763071228f5e2bf428f08c62-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=227c65f3-2045-4167-8a05-bef178b280bb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen69186698b94ca2e3725954058c23ff3e889df25306069c-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5ea3890-1cf6-4576-9cbb-ecf2a2267c8a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-build-image-index-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6e4eb6cf-ef0b-4d32-9f1e-cf1738ed9245 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-on-pull-request-z2mmx-clair-scan-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e0cddd03-2db8-42ac-915a-2e1f344069f9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-oa38152c57d5b468c67df3c121a1bb1a2-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bcbb78fa-f3f5-4dc1-b523-9671012160eb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-o19f258306ba46871ea38dc0509ac0b12-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18386457-7353-48a2-aed2-41325fd9a20d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-on-pull-request-z2mmx-clamav-scan-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=edd18b54-3111-40e2-bec4-cfe759c1efff user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes273624a65f85948a3b6f6ca0a6f203b9548db5165455c821278ad70d-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fe857d69-c3dd-41b8-be52-3050ba76cddc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-djdhsvfae31bfc1b0c2f7aa1c003466389a6b2-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=542dfb98-8cb5-4f0f-b3c1-e0315a963158 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component273624a65f859af83cecbdb2e58a64fc0f7ff4815d27b-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fbcd5192-8f9b-4ad5-94dd-f4f2e459dd91 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-djdhsv0912e14fb00d168b7177d0dce1ef5ce2-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9e0402a3-1361-44d7-8efd-7b001580bea0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone273624a65f85948837c2003e0bd34e9a1022a934dfa4d38-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=404ab786-9ddc-422d-832c-e609620ed2c6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g29dca546ae6c8adad8e98b2c982b49440de3c729815f-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=acb3eeb5-b518-4805-ab23-4663af58e952 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-on-pull-request-z2mmx-apply-tags-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa78b4ed-c906-4b4c-a193-d8596b2a5958 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-djdhsve5c2e870a1cd687b100d43edf63e1279-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b915f156-4f98-403b-895e-3b6d1b59c1c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-siavfl-o95749f07015bcf48d5f1765d3f71aa84-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=05b1465b-8b2b-40e4-a8f3-4f1ee944433f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes29dca546ae6c655d4cd90be42e4b64a84bc9ef1b81261b1084fbb18a-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=43acb775-5748-4ee8-a7ef-1d355a7141ae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon273624a65f85948a2c9c0650c6d7127d88278a6822aa500d-pod namespace=integration1-czbd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=97ba476c-d2be-42b2-aefa-8192fb1485c0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-29dca546ae6c6555a1783bc803e0ebb9ba6c3e774b127-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4de7006b-db3b-4c0d-ac38-f06483e44153 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-djdhsv3fd23c2cfdf3aed87442ffbdd5712ed1-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=986abddd-8cec-43a3-8dc1-e056f82070cc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pa29dca546ae6c6556b2f01e02de46f7f0151f684b4d851ac-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=215f4a78-9d9d-468a-83b7-0fb0e1dad39e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g29dca546ae6cb8810b224ed9296ca8250584e2232974-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2efed459-14c0-4b7e-86d6-7ec47d700ea2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-p29dca546ae6c655dd8dd2bca489d6db19e74c8fa7f57a9c2-pod namespace=gitlab-rep-yumd operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd7867e3-a325-492d-a891-8e96a948f6f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-on-pull-request-ssh5d-clair-scan-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=136db502-8236-4866-8c45-350c59926d54 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-ob3c5f9204d3d4d838f86f3bd90989576-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cfb23385-c36c-4a70-8e3c-e461691ccd31 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-o946f0b994c3e5409d9285987abafbb42-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bfed82dd-77a9-4800-9325-a00c4c961310 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-on-pull-request-ssh5d-clamav-scan-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=66f473f3-af3c-4a11-9bf6-6395c53d6303 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes69186698b94ca2724754e43358b67d9d01368f68b74866c9286d260c-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=da8d37fb-866e-4da2-b033-795f267660c6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component69186698b94caf2c7c8a79afd197dac99a4939d98498a-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d18f5064-30be-4e4e-be56-74e6148bd5b2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:07:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone69186698b94ca2786ca22cab212a0bb0852374e536ed8d1-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f1a1502a-b41e-4786-a6b2-98c1650a3ff6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-on-pull-request-ssh5d-apply-tags-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a5ea83b8-da9a-4cc3-b543-de35b7f4ab80 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-o1d57584126fdfd8881b40d432c585c9e-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5064bba6-f85f-46a7-8fdc-531ce58e8448 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon69186698b94ca27295d1121d3cc892d77f6f9f8bd5ec3339-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1dd9056e-93ef-4b85-862b-955f158ccf91 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:13Z ERR github.com/kyverno/kyverno/pkg/controllers/webhook/controller.go:469 > failed to update lease error="etcdserver: request timed out" id=0 logger=webhook-controller/routine 2026-02-12T13:08:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5fbd47bd-e2df-4924-8528-74dca78fd027 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull0f2253dcf7afcebd49f476a044130e56-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=81a047f9-1e5b-4686-a6ca-b82a67bb5306 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-sast-snyk-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=899a58fa-d9c1-4aeb-85c2-753b1661269c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6ddb86ca-f393-4269-a155-30969910910d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-7c6d3ff60f95aa969b2f631538988e170feadb8a41a6aa75f815d804-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bfcb43dc-50e6-471e-bc35-c52a134554ad user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-sast-shell-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b68ed80b-51a4-4994-86ed-215596b59c0b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pullf79ae787f6bfda62a12bb91c73bcb0d6-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e011b31f-e549-4940-a486-aba43d16fd81 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=436d1d38-c261-4322-8254-d7d432799649 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-jls62-push-dockerfile-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ec73bf56-ec21-4611-ae22-6696f5b082d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:08:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pullc1328145848956a0d6e6f7a2030ed918-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5203ecd1-415a-4484-8b98-faee96a3d473 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:09:11Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-12T13:12:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-pdrh-task-success-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3209c101-6b8f-40b5-94ce-2d34b561d4d0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:12:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-pdrh-task-success-2-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b27de0c9-3744-44da-9f44-4d91b1f563ec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:12:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-pdrh-task-skipped-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44d396d7-314d-48da-9981-05915bb78e3a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:12:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xtahvs-on-push-7vpf6-init-pod namespace=stat-rep-ftso operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=969a2df5-dfcf-413f-9246-8eb2f7906580 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:13:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-54btp-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2f8602aa-3f32-4c18-87d8-eb474078c764 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:13:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-cobca3459db57ed207d1c7520286a6ee16be58b598094dd53821-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bff4154b-01f4-4db6-8433-52f3bac3009b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:13:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-496c0459cdbf0e96dd490f96fb6381ec-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c3bbd507-5587-4bec-9b4a-d62b1c089eb9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-99ce3a9f6373add951ef44eb1189e8da-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=37278c70-b9cf-4c77-b561-248af12a5ead user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-54btp-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ffd4bc31-2796-4393-82df-aa65c15fcb41 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-52318ae8eb3274b9af894083c7046a0e-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4f04788e-9f22-4455-8d27-e14133cf7d08 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-26e64b751c58148248cd05b05684268a-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cfcae0f4-00da-4624-ba2f-c2204676f64f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-54btp-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3afab80c-5f23-4692-a108-2942e44f5988 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytbca3459db57ed207d198ea4aa6236a64746da8d9531e7decb3a668b1-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a71c6025-6fe0-4929-b0d9-48aa394c9e66 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-aaa53953e3d1463b2c317624e0b45efc-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c8b862b4-ebce-40aa-8889-e3fd8c90a589 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compobca3459db57ed207c7d8307107b45141efe26981ef5acb2-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0eb97688-b99d-4964-ba73-4f19ffff2f1a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-54btp-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=db99b188-a52a-4279-b96b-0ac36f11869c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-054b61b4132eb5ed13b621f8a3588741-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8c627522-d5f0-414c-aff5-d5bc25dbc2d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:14:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compbca3459db57ed20755e3db1cea033a96ff6e095180af43d4-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e28ea614-3b90-4ed6-a213-d8b73a2abef7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1990db0b-c048-4313-8419-41b55d2d3d55 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cd0ce55c2c97dc1c7a5971db8ac43ace67-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f52424d0-c6ec-4eb5-8f77-990f67aefeb1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-prefetch-dependencies-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3f0041af-901a-409a-ba33-d052e31fdf4f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-build-container-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=56558a26-8c1c-4673-8950-810bef16045b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-td7710e4d190e3243d884b664fe57a4c44e48a7e5e245488902-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=98712943-db88-437b-94e7-ab935ed37257 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:17:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind7710e4d190e74433460a259c106900445dc9b976cff-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=97a96a7c-5b72-4eb8-a0c6-6e9a657b5d8a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-build-image-index-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e548dfb8-d118-4cd0-a225-b5a1ee38ee77 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=edb9c739-3ff8-4bb4-a6b5-203603d24824 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-241387776c03859e85243cfb97834de5-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3e52f498-60a2-499d-9d5e-56061b830be8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-sast-snyk-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ce810163-783b-4693-824a-f271d223d6d1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=760d6799-4fba-4540-9c19-21565b5c0aba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt4d4c2c6870a5ae6d6c1d1bfd3271a2722571725f99e009b108225095-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=70ab15dd-cbe1-4879-8ea8-11d5683b1e9d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:18:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-sast-shell-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c9aab490-fb7c-4d30-8d63-f554c05bcb48 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-sast-unicode-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4dc6d34e-b964-4ab1-ab9b-175858b76dfa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cbe19c61-19b5-4c2e-9eed-ae3a0fd019b4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-push-dockerfile-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e6a0e1a4-1099-4a12-913b-df9297f25341 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-push-d57sf-rpms-signature-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa8de179-70b2-41b2-b570-3a1e04951025 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-d7710e4d190e32861d83fafa04f160e596bb7e94464e12-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03c583e1-14ed-4def-9d7a-c3328dd7c7a2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrad7710e4df29a4c3b40642c7604b0559669baa1d-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e531f3a6-0bc8-4aa3-9b37-750482be601d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl7aebf3e73a479540c24d0861570c2c09-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d4f8d9e7-9c47-4177-be01-9c78f753e447 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind7710e4d190e2915b6e66a4c83e7c8036dbe9163d227-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=22eb4e53-e815-45c8-8044-1bf74d98e90b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrd7710e4d36d808349eb01fe8b9964c4ee5c4fdf2-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=51019915-7c70-44db-8d33-52a2849abe82 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kond7710e4d190e3243d80612448db1396c7725faaab22d42efddcd2350-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3cc451ae-cc04-412f-b8af-2a61fcea315c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-id7710e4d190e3ebd292369db10b59ad312d009d89b77d-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=87f834a4-c0ca-4abf-b7d6-bc56dbbbef0b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-testd7710e4d190e3247698dd8619c6c8d47d4f7f08bf250e98-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=27752781-fc40-4ade-99f5-14e1a2e8dcfb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrad7710e4e390967efd482f40140b0dc416603c92-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b26c2bbc-f3ee-4ce7-b552-dcf55fe5696d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ind7710e4d190e1f27d89eaf1964ed97c16be51238ebd9-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=13e768a1-62a7-4d38-949b-49a59d011726 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:19:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tesd7710e4d190e3243ed51f34f4162294c381a879a95367799-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=466aaccb-b52a-4b48-a45f-4feabe9ea159 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clone-cnpeug-on-push-jrn7v-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6bea1a14-5ad1-40f6-9f6e-ae2344299ae2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-wv6nd-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fe81a317-2d19-49c2-b5fb-da3d99590bfa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dbefd2bd-811b-4719-aeae-54be68cd5c33 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t2c0d9ba05f222f207eb673016ac97b0ce44848b5f049e88b31-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=98db5956-ea3c-44d5-bffa-3c0d7da2f703 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c7fd27feada11f60133fb3df0f4ad3bdd1-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6a21653c-7496-43f6-9772-f879e1be7cf2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-cofc00610a6108e1cb5a47ea3ce840a13a81289517dba942d859-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=08c2cca0-129e-4d36-8d40-55d05e60c4b6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull272522ff2a0322b32d933a06ed0ed0ef-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=df32d477-bd4a-4a7b-8b96-0d027fb3a41c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:21:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in2c0d9ba05f22fd9857a2cf31db9c1af8816ffa0f3112-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f1639eb-49a2-4176-9d50-9ba26324b309 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:22:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-7078007fff359ae0fc0301f44dc0c0a4-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e85c430d-4307-4a94-b746-baf8f20634ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:22:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-build-container-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f65a1d91-7467-41da-8c18-3c37202c7750 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:22:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t7246cffb04a83a3b64360ebe9121a49eb8a48a635d73770c14-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8f1f0606-6a3a-4af1-b6fc-946f31e1b9c8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:22:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in7246cffb04a839ffefd193f3505875be96b5e547c5ae-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=42ca9768-a9f6-45ed-8e86-22a8681a82e6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:22:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration2-jvzf namespace=integration2-jvzf operation=CREATE policy=deny-virtual-domain resource=integration2-jvzf/Namespace/integration2-jvzf resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=481b5024-ad0c-4c19-be6b-4932077b3dd8 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=8840ed8680893f7cbff62781899c43ab231b07e916cedbef03809f5a9b6d4042"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:23:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-on-pull-request-wsjjl-init-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9fa4faa0-727c-44dc-bf69-ac6bf0220e5f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-2c0d9ba05f222f0840120a0ca69ef73443266867e33f6a-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=177185bf-35fa-48db-889f-27654f156db2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compb21af4c709045e3a277ba81ef2b5e1ec9bb73a77f2ab23e287-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7e087c87-eb1a-42c4-8ae4-de3d1e97d984 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl69c8e0657cad4e69c29f13321bf62193-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ec69bdbe-1508-4d72-828f-a87ff53460ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl51589d21dc2559741cd5f74a6780d7d0-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e6e90002-58a1-4fe1-8b7f-f21da053bffd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in2c0d9ba05f226da7b676b706886f61cbbc725b24333f-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=58451ba5-45e6-4c7a-9f14-ea84dca672db user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl58bd8017cbfcef853ed7b02ad5c22eb8-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b04a94c1-4885-4c8a-baaa-2dba5f4b9f64 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon2c0d9ba05f222f207e849138c4ed7a4342e20c5da2c52332536347a1-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1ea82ece-519b-4894-8724-eaa2c6c189b7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i2c0d9ba05f222bee86317078513537e8e6559b94c3bf8-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=af6b7d25-f991-4526-9159-671d516460a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test2c0d9ba05f222f29030b0e9ad3075c3270699bae12aff1d-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f25ad2b0-8dff-4b36-8efd-ebfc78a9af41 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl5f4d7ec49a815d5d6c7cd8b7d44776da-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8bbeb3b6-f684-4574-8d97-f738a93661d6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in2c0d9ba05f226b03a2b4184966c5b99c29c482be0b68-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4360f7e9-0166-4e3d-8317-1b1de6016482 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes2c0d9ba05f222f20698c0a24f7e67cfa67b52a152c256f73-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=31aa1081-355d-48f5-a115-353366d79c1a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-135c4ac7fb57cd0a3fbd714573875f0f-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e956287b-0089-4d81-ae7b-9d14fb23d1fe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:23:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-o0d3da5ad8ae1fb5775e0e4983992bfbe-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dbb1f690-110c-4e69-8861-0179867c0415 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-build-image-index-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c274569-f485-4662-a7b1-7a0df3e6eb34 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-7246cffb04a83a58814bf71824f448049a95ee5e607ed4-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee0257b2-cce6-4132-993d-6bea61146be8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-wv6nd-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f4932d2e-fe4d-422f-bc6f-bbc97d52e542 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-3550d2e8879966d5885b2b2bb6583120-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18dacc7f-20c7-4a8e-8e97-12c34b9eac45 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-1a9ec802ffaa9b503a93e6337ec8e24e-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c42f10d2-e25a-41c5-846b-2ab02418bae9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-wv6nd-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dd4c724b-2564-4826-83d4-7d555ca7e088 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytfc00610a6108e1cb5a2ebb60fe3416ecd913cf4c9a81e01e16508ea4-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d9ae4043-c40b-403f-b1e3-eec7b82db02b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-75fe19aada352816b12ddcddcf383cc7-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b4667462-0958-4f4a-82d5-58b1da0b7897 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compofc00610a6108e1c4956e0b5c3219ecc5efafef095c2af0a-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=122fe9dd-79b6-48b2-b874-e37c63ea95b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-wv6nd-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a8c4e658-8524-408d-ac75-aa296be795ee user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-5bc44c1865f6e04e5e038233d3095a85-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5196823d-5607-4db2-80c0-e28352b2decd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compfc00610a6108e1cb65073a047ff11ef5d7c3958a5cbed966-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fe55b439-6efd-4bc5-9fbc-f366867d0e64 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra7246cfff63a87053f9a87dbbdf3142d64c723cb-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=349331f5-b8e5-4fe6-9471-56294ba8d114 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clbfa9b69fc981e187c62ec375036bcf36-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=05a24718-3627-47c2-858d-ad9358c87f81 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in7246cffb04a86d81ce93ad1250750b6deeb6ab5868d5-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=072d41b1-43d0-4b70-b2c4-3a64a76a5cc5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr7246cffb632ce2c4b43997a1317e814c546ba0ec-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=11b20dda-6873-4687-8510-273201564c6e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon7246cffb04a83a3b6455fcf82c1e7f09f93bbc95f231927c4e07d162-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ed42883-8608-40df-9604-0b7cd4dbc029 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i7246cffb04a83ce36c97ff7df48d5209f5ff963c73798-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=135811cd-e9d0-43a6-bcea-96163c6b391f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test7246cffb04a83a321d8180087df0fbe61161be4fbeda661-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6e26f74c-b7de-419d-84b6-f9eee09bf590 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra7246cff21f3624f5b6476a484e91d30a09e54eb-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f7b118b6-2989-4c51-9783-6bd177b0bb1e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in7246cffb04a8142be019d154a5ac0535a8fda70ef028-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bcdc973-76f9-417f-a7a7-494b67218c16 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes7246cffb04a83a3b4cf19d877b60e639b3fa729b225c3055-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e5d23c4e-0716-4282-868d-c5e0008311c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3d0e5654-5387-46c5-9cb5-0a2aabc0ac40 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pulldce1462127c35c7fe406594646611905-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9f6e6f58-230f-41f3-9bad-1ad067011c18 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-sast-snyk-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2e8b94fe-8214-459d-b836-17017668b516 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f959548b-783c-4fe6-b956-70ac3c329863 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:24:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-e2e12de8c079d1bc57f4a818aa7043f6aa045f13238a463572e96a87-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=00c9d23a-fa03-4805-94ef-f08b897b11de user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:25:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-sast-shell-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=136179e6-9c7f-422b-80bf-01189bd5b406 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:25:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull6ab824acf6260405c4127d024cbb53c6-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=370ea677-2c83-421d-baec-ec7829294038 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:25:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1d0cf177-5647-4cdb-ab8b-99118eb0e22e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:25:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-dpvcc-push-dockerfile-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c11d945-bae8-49bd-beef-4b6fe07fb2e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:25:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pulleafa5dc8f027cecfc5f4a78acaed9de1-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=519d789d-8c39-4ff6-a791-82fe0e237171 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componenb21af4c709045ec734f44c9a7dc70871ebdb9641554df8-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6508ccee-e736-4030-b645-f8685a99b6ed user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-on-pull-request-wsjjl-clair-scan-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8b5d5426-63e1-40a8-a239-6fc96f75e84e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-o36be8f30afe278c2fca532e5040e908d-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=33c1d0c2-3508-4901-acbe-94a7f2d24be2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-o58c118874d8a031fcebe4e4839c27ed2-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7380d4d0-9750-4db6-8c27-c85a9d972449 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-on-pull-request-wsjjl-clamav-scan-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5700fc16-4f58-4056-83f4-dc38ba7cb354 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tesb21af4c709045e3a275e131cb7074f21108b8d7196d98f8eb73be185-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c0815caf-5dd6-4f88-8893-f66a35a71734 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componentb21af4c70904547887a4cb30a3f446d374b4357513c50-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9dc87437-c0c5-4955-a533-5f6d0b493798 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:26:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componeb21af4c709045e3ba7ecd481701515e56d3fdedc9109081-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=517c827c-9ade-423a-ad2e-5c48be92a34c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:27:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-on-pull-request-wsjjl-apply-tags-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd6e63fa-e59c-4982-8b05-d446163ae745 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:27:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-nhztxe-o3a3ff977bfef05a9c9d0e7c029ed5c66-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0dcbac9b-53ad-4559-b4fe-12ed5ea532bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:27:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componb21af4c709045e3a7f611037bb64264741f443e0e703f016-pod namespace=integration2-jvzf operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=31435a0e-ebd1-4872-b917-45112cf57949 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f42b9840-f1fb-4682-9c61-1d6dfac9ccb2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-n66t7-init-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3130b1d8-d851-4668-95a3-a8caefc191ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull3bd0caf7a8d57b2d4241b1fb8adff1e4-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=122f852f-8346-41e3-81ba-b1006a444298 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co769af9570e3e3cc0fdf5ffc726153e81a1d5ac385cd59c2143-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1367b5ce-b197-4c20-8a74-bc050aa207f1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-build-container-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=897c2e1b-0c28-4407-9a61-383cb466817b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:28:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-77c7e7063087b2bd5c6826ce46c5268b-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3707c5d0-ee6c-48c4-91f2-5d541ab0cff2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-build-image-index-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1280f6a4-e0da-4eb1-aecb-6d47af0c0f02 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-1953bcd12dcc7c79af25999c0683b7fe-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4bfbb4d2-af9a-4c47-886e-9c06ae089c8e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bda7a645-57c4-4882-9209-bf508580b677 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pullf0985b09a0bbd5ad9fe6caf38ee9afbf-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=04626a99-ced2-4d7e-b36f-c985184c81ed user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-sast-snyk-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=724b6b15-d471-4c5c-acc5-b3fbb8d70d60 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4ae20ce6-74bd-42e9-bc6f-e0c0707e5929 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:23Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-17e2feffd05f38325e388c3a8412167ae7af283a6ef421c4e2b2df95-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9150542e-3ec7-49bb-b474-8cf5e73f6757 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-sast-shell-check-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e2e8f4fc-290b-4a4c-b355-083098a09659 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull72386acfd4f0cbfb5b9dfff0d52b2fcb-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ed453dbd-1fd9-411f-b41d-5c64ac655bc7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2fb604fb-7307-4894-8360-3c5394a6056c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull-request-nj8dr-push-dockerfile-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=33a8a9e6-78cb-4de4-a330-3a68118cc99e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-obukos-on-pull7245f3678e62a31661bdafc9de1375cf-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1b4914b9-94b8-4d60-a33e-c470dcaa8846 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-n66t7-clair-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=888c6397-b531-4d29-96d1-104ac8787e7d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-7988243bbaf6c5a0815469cedfba8d04-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0c05f4a4-e366-44ef-aa9b-90ff5d644681 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-5880e63a49c0e52f5cd6311cc32db4fe-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=199fa8e8-81fa-4b7c-a399-eea2ed5afb1c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-n66t7-clamav-scan-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a22d0d0e-4999-491a-9806-9d176750bedd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt769af9570e3e3cc0fd7c2bd9b134543cd98eb7a52374b50c00b1b703-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=10266ade-8014-4def-91df-0f6f923f63d5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-bb70fd95e0e996e661e090bd4ea5f0e8-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=46ae9eec-fc9a-47c7-b4d5-4618853e843e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo769af9570e3e3cc7fb674a33f22dc46f527e17a227e874c-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a49a52aa-aec6-4899-9d69-37b0b6479b4c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-pull-request-n66t7-apply-tags-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a26c3cea-4697-400e-ac3a-1891877c8a69 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-haugil-on-c3001cbd6b5e510c526487de157a92f6-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6f159fec-e641-407c-a664-8f5b85751c56 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp769af9570e3e3cc07d4d26910f153b0e2829ebe1d3eb2873-pod namespace=group-eukw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2e98e2b4-b01f-452c-a163-b6487cc4025e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=de26e3f3-6d62-458a-b937-fcffca077db6"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["b076d4d0-be71-4024-806c-11f17507e29e"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-mtfb5"],"authentication.kubernetes.io/pod-uid":["dd201f36-8377-479e-8a4a-efc3f8d6b98e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"b47755d0-bc3b-46e2-a724-0d90f869eb8b","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T13:30:56Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-pair\": context canceled" logger=setup/runtime-checks 2026-02-12T13:31:01Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-12T13:31:03Z ERR github.com/kyverno/kyverno/pkg/controllers/webhook/controller.go:469 > failed to update lease error="etcdserver: request timed out" id=0 logger=webhook-controller/routine 2026-02-12T13:31:04Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:452 > Error retrieving lease lock error="Get \"https://10.96.0.1:443/apis/coordination.k8s.io/v1/namespaces/kyverno/leases/kyverno\": context deadline exceeded" lock=kyverno/kyverno logger=klog 2026-02-12T13:31:04Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:299 > Failed to renew lease err="context deadline exceeded" lock=kyverno/kyverno logger=klog v=0 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:90 > leadership lost, stopped leading id=kyverno-admission-controller-877795fc7-7lcx6 logger=setup/leader-election v=2 2026-02-12T13:31:04Z ERR github.com/kyverno/kyverno/pkg/webhooks/server.go:316 > failed to start server error="http: Server closed" 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=webhook-controller v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=global-context-webhook-controller v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=certmanager-controller v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=exception-webhook-controller v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:50 > stopped logger=admissionpolicy-generator v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=celexception-webhook-controller v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=admissionpolicy-generator v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T13:31:04Z INF github.com/kyverno/kyverno/pkg/clients/dclient/discovery.go:103 > stopping registered resources sync logger=dynamic-client/Poll v=0 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:124 > terminated logger=EventGenerator v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=kyverno-events v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=global-context v=2 2026-02-12T13:31:04Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/controllers name=policycache-controller v=2 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:571 > Stopping and waiting for non leader election runnables v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:566 > Stopping and waiting for warmup runnables v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:575 > Stopping and waiting for leader election runnables v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T13:31:04Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-12T13:31:04Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:583 > Stopping and waiting for caches v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:587 > Stopping and waiting for webhooks v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:590 > Stopping and waiting for HTTP servers v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:254 > Shutting down metrics server with timeout of 1 minute logger=controller-runtime/metrics v=0 2026-02-12T13:31:04Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:594 > Wait completed, proceeding to shutdown the manager v=0