2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-12T18:09:53Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-12T18:09:53Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-12T18:09:53Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-12T18:09:53Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-12T18:09:54Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-12T18:09:54Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-12T18:09:54Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-12T18:09:55Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-m9m6r logger=setup/leader-election v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=48fb4d57-3412-47fd-96c7-9e77817e012d v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=b0335117-ec4b-48ee-91b4-3c0e5e2a2fcb v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=c06903ee-9153-4faa-9510-d5471e03a38b v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=02781ce2-0861-4572-9148-408f846a0a1d v=2 2026-02-12T18:09:55Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-12T18:09:55Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-12T18:10:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac2e2531dad032afcff83fac8f6a86bc285256974af4510e-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=93f511d0-274c-4ad0-86ec-0d5b0c2a2f08 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componenaa454a3198e0717337c59747cf19d7f17a65366bdb9898-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b1cc313e-62d7-460f-979b-a0770f1857d8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen4a4de905ffde6508944ad32a2e6f04b1c4bdf094519e89-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=153a34d6-4aca-4d05-97eb-695f9280b139 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-build-image-index-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a937cbd9-6304-4869-b903-6e9de3d4110c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nmwzsc5b78ab7e7e925731b4619c38079f6e66-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6643c9d3-a139-4f36-9c90-3e4c671f283e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nmwzsc57df2abd5269c59b1378fb3d33ec2eee-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c7c3bfe-5432-437b-a2d7-830ccecc6059 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g2e2531dad0324a2862b8879695f02b4d4ba24f4fd481-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=12c26470-688e-4785-b4b4-c1b0fc7720e6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nmwzsce2437d1704dc3c9a9c440cc4c04f88f4-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9bc7a0e3-3aac-4aa2-9e71-f1e6f604a82e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes2e2531dad032af102795afe50a2f8fba4a005f824abe49bd6f161fb4-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6b13d559-2ae6-448a-bf8a-f7bc2b79fe91 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-2e2531dad032a2b358ddf451c77a26e51e313e606436e-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e1786870-313b-479e-b90f-63f9195f932c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pa2e2531dad032af1dcf39859d1aab4bd1ee0bd0a6b882430-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0b03cab2-6ed0-4539-a615-0490c3c42bf0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nmwzscaeb9b0a6c9a6a88ec15fad8eb7238e76-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1bffe0af-4463-434a-89cd-fd0fbd41c172 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g2e2531dad032499e3e9e6c98c88ec887ddb872610fae-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=79c4023c-27b0-4fd2-b8ff-e13f63205f4a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:10:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-p2e2531dad032af108801e93283201db6c6f4b5aaeb632334-pod namespace=gitlab-rep-ucpq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=93aa9ddb-483c-4dfb-bed6-88e9a6048ad0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-on-pull-request-n8tjx-clair-scan-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=da307099-d28e-4fe8-a94f-e8dbfe29a606 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-of2707761949f66dc8cdbecd54cefb506-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9f596ad5-74f9-4605-a85f-82586e41dddd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-ob23edc5649eff104f1211e199c3ca7fa-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8aadcda4-2ec4-48d5-aa72-82e9fc63bad8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tesaa454a3198e0717b6bcb035f5eac5a268752ab49fab5b79840f5ff5b-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2f46a5c0-2987-409f-a59c-650623415643 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-on-pull-request-n8tjx-clamav-scan-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=174289fb-c2b4-4033-b9ec-c8945e319bf3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componentaa454a3198e077f7342aa0d55da116176b814322f6a5c-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6293f3a5-3626-4ec3-adff-d44715471bf5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componeaa454a3198e07176635152988e9ec433f860f0c213283ad-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a46d9676-3363-4115-9e34-d08924b89fa5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-on-pull-request-n8tjx-apply-tags-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e452efcf-388f-43f4-a012-72f2991872b6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-tyypsz-of924217259b4ef205762503df0c1bf6a-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c8b3c0d6-cf71-4215-8d23-0db7e6a92c14 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componaa454a3198e0717b3f2d28fd378c90fb0f8cb0ca348a4426-pod namespace=integration1-tgoo operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dbf264b1-ba6e-4db6-8571-1f5901ac079f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-clair-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9b535cd7-3ae3-47d8-b491-52a4d1e04a93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull8a2a7424d1d835d4bc8a4c05b14c5b60-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ab0e3a5-63e2-4c21-bb23-497df294bb5a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-sast-snyk-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3c7d8b62-8f3e-4ebb-ae00-02c72380a621 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-clamav-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=afd05fcc-8bb6-4865-80a2-a282c0461e20 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-4241ca278238e122bc0c27059e478be9e92aad75110acc82eb5c376c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=30fa0310-c3e2-4bd0-91c4-17a954bad79d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-sast-shell-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6160e47f-0cc1-41bc-bf9e-d8bc68eba164 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull740a9d32f3f62ee4feb25e4e2b9b0106-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=732af428-9dce-4a55-933f-9217df83bc71 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-apply-tags-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=01dd8c4c-5eb3-41af-881e-f665821cdb0a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-7r29c-push-dockerfile-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=83cade4b-0ec3-4a03-9144-e29c7a98522e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull13fce2ca83c64d8b19873bf702149f3a-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f84eead9-99e0-415d-9159-e275478499a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-on-pull-request-nhd2q-clair-scan-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=214956a3-0b6e-4f83-966e-5c4f644e3de5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-o5959e5c3ef1256d9c0df62ee7d0d9948-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1c744364-13ce-4187-83d6-ae35ee70e3a5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-of44501bc797cfe4461ca10a9241f5a12-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3964db1c-16ae-4971-849d-ca32eb1633c4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-on-pull-request-nhd2q-clamav-scan-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7e69dd61-fc5e-4555-ad39-4a6b923eaa66 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes4a4de905ffde65f0e2fc3cfbee6240abbb1bce595e63b656d09fb2f7-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bc79d4ed-33cc-43fb-bad2-89c7e7260066 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component4a4de905ffde6866a0a814be03f088040489e1d9853b1-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5dda66d2-2144-4ef4-8205-ba99bd1938b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone4a4de905ffde65fccf74c2fefcd2822150b5a42521f8513-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=047541f6-a9cb-4483-9980-6dd1f4b3a9b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-on-pull-request-nhd2q-apply-tags-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a0f27c06-db4c-4bde-8d04-bf71d8d0b04d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-xmpsqn-oc83691fc0f1fb1327081ec5e7ad4627c-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7b2f2980-e114-47d1-9625-dd92e72d709a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:11:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon4a4de905ffde65f0f081bc7077c8fe3fc86c94138a3ad4ef-pod namespace=stat-rep-gvbs operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78325839-114a-41f7-8d2e-2ea26161e9eb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:20:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kpqtn-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f62073e3-bbb3-4ae6-918a-d709588dda1d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:20:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co4ccb506153409531d504ce445b49f5dd260b943243a055debd-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=28b5ae3c-c9ca-4607-b8b3-a17c21118b30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:20:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-896344bf8e2abaf84c72168dd2804689-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3de2b163-c5a0-4bdd-80aa-a9e9f0684f8d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-babddb916bb0d568d63df2227cc801e9-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=72da68a7-3898-4d80-b271-106255c1a4e5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kpqtn-clair-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9edd636f-9910-4c89-97a0-e90fd12fba56 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-a38c461a9e4112797028a0f13b78088c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9dc5b806-cba1-492f-8ed1-c0868876400c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-ffeebcc0965fa1f67e87f0e7e44cb938-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c5514c2d-dca7-4a40-9eed-7a4720bf10a2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kpqtn-clamav-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8af72f37-8b29-421f-8965-210b325cf9be user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt4ccb506153409531d50c4497c935654954768bfd1fd33f8b4aaa6052-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8221dc47-1f0a-4548-9505-46e92d938811 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-0df6779ae181f48aeb9fea9085f04f67-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f92b1409-5e81-4d74-ad97-981cef0d99ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo4ccb506153409530546830dd3d72583b78a120ff0e84595-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4175f162-ea4c-4743-b249-adb246b99a26 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kpqtn-apply-tags-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c214b015-35ed-49cf-a93b-698c51e1fdf1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-0b1f8c837873a02163033ea32991f127-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=070c6abb-a1a8-4257-89f1-1ef24b02364b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:21:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp4ccb50615340953137c86eacb9d968da2850d9cc29f243f9-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=10962a2e-9b82-4719-884e-27592e02e4ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:23:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2213a2d-8739-4e08-989d-443edf561235 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:23:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cbe78358f7204e85f0133035ad2b239806-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=19c65dcc-04ff-4d4e-a383-0ec6896a2e73 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:23:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-prefetch-dependencies-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f3635c86-be77-4d7d-83c1-35bb5464d159 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:24:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-build-container-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c5f2dbb-5a30-4241-88c2-eaebb3d1951a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:24:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tb281cc40236c568f51ffe6e89779884279adcff877cfecf3d7-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=45b478e7-9e0e-481b-8e64-46c1b2fb6e50 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:24:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inb281cc40236cc1c51f882bea774b25948b8474c45207-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=21378f08-5faf-42a3-8ede-c7421149c3f3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-build-image-index-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18082632-f65b-417f-9331-51e4ef07a40d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-clair-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a777837b-fb16-4a17-b049-95d622ddf525 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-sast-snyk-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=84cf922e-a941-4324-afb0-b68f966396c5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-911c988e6ce0952999f5a3d986574edf-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9560e6d0-757d-4b3f-9a6a-f9318448c59c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-clamav-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5d79e20a-ebee-4273-b23d-2013ab5fdcb2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytc61ed5cb36612bebdd51d0e43b98193704bb33323067557e5ce9699c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=01e06c84-d74c-413e-bf17-cc65d7cfccb2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-sast-shell-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2ce77212-df87-40d7-94af-bce087bfaf73 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-sast-unicode-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=51ca3b07-0185-450f-8c6f-180c25689709 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-apply-tags-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3744d6c7-492c-4863-aaf1-27832766bb12 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-push-dockerfile-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=00d72c1f-1cf0-49cd-acb3-2cb937ce5613 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-push-xw2vt-rpms-signature-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d07012ff-dcd2-4c43-b09b-fad6fd993516 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-b281cc40236c56797749851c798b98bd4250938ceebd8a-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64aa5a5e-d53f-465b-87c4-3ff6ce75136e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrab281cc42db6295b238acc4d89d48b76cff27669-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c227367f-c5e8-4c0d-8ba0-7a3f223d62d7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl61f0ae7eb3e54128a38a40ee5fd1059f-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9e485af8-bc29-4717-914c-e3f26f76f5a8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:25:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inb281cc40236c693d84d4baa12a07b79aa44960eae01a-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f5745556-b2fb-40de-ab1c-fa85b606c621 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konb281cc40236c568f5198131aba3f07ca4e46434e2c7826916b1a46d4-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee625bf5-5846-4ea7-b93a-bbbd093ef4f5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrb281cc40ffa40deab9040772b21ac77ac86113f8-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=414bf305-a17f-4174-abb8-194157a25dd1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ib281cc40236c522a74b218d8d3f3f37f263c68ece2a39-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d61aac35-d3c8-43a3-a76b-e153dc9c98b5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-testb281cc40236c5689ccacaf8e2b16b1200950193126ceea0-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a1c9af2a-f73e-4bf2-a799-e97fd0f5713b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrab281cc484fcd3d4fa7217dc235ccb2dace076de-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8cdeef0e-1462-49a0-83ad-60d87396cc31 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inb281cc40236c11655ad66f374cac7135711ced3f770c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=102529dd-5bdb-4606-a9a6-d74b56f1a316 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:26:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tesb281cc40236c568fbefeeabdf725d6b23b0426297a5fe2c4-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b31788a9-e2e0-46d8-88d2-869f67f9d174 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:27:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clone-ufexlx-on-push-tlfkg-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d32946f6-e668-44dd-8cfb-0775b1976825 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1b80221-b6c9-4ccb-8490-f70db2b883f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kxk7x-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d3c37b00-8370-470a-8746-6f037255c9cd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t3cfbb19458c9280d1500e00b9d79b4316de34859de0d0d1dd2-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=70507380-3890-46a4-86cb-e5140c009043 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c5c57a3b432bcd8cc27b5d35d6b11a8415-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7fe375bf-2206-4b00-8b18-6f408a79ba29 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in3cfbb19458c905ab06de77cf7fa08ffd4484424f485e-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=443268e1-fecb-4b18-965c-725d59c39dd1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pulld5322e95cee49a5db2ff49c5023b5788-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6f525611-5a27-47ac-9385-f3161e87d0ec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-cof23826c990482200d0837d6f492e0b9c7ae785e51e7386f240-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=85b9d196-f486-4dd0-b2b9-e93364b70d46 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-build-container-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0cd6b704-50e3-4f0b-9747-9802465394e7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-aabdcca2030b22eac3da3b0bf572c435-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9c48a5d9-3e7d-412b-96f8-a60b669f129e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t5880350d41f0d401aac0a45cf40b546f8ae50a722bec8132c6-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2ad3a56-a63d-473b-937b-0418bd9bed70 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:28:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in5880350d41f00c764ec79197c73831fe155362f2277f-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9dfb8b81-e17c-4d34-b0f2-8af44008cb1b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-3cfbb19458c928184bbf42e6f393852562ea55cd9bdd21-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5d2449b7-263b-4943-a23b-103912524580 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl9d304703c22a9c5379ad052c59a2f8e9-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=40c3188d-d8ff-4e5e-9bf5-9fdb29860579 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cld7f1c001e36840df61cbdc898619b0ce-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d17f4fb5-ac03-455b-8d08-d1dcbaa00edb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in3cfbb19458c93d4d6f2aa159853fb6fe90414083339c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=48613758-9282-40ea-aac3-bf8f24f6ec5f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cld00bc0bc7a3357b7f0265ca2ef5e8ad1-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=639b4a90-f292-414c-99cd-e97effcc85ea user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon3cfbb19458c9280d1522be80e1c9b9f3cb5a25693782295113593cd8-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80ae73b5-0539-4870-97d4-c744c55c96bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i3cfbb19458c926ae1e7df1c2aa24cca0b17d5709485b9-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e48dd5cd-c406-42ba-94d3-8fd7ba8c3b6b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test3cfbb19458c9280f48cc275768d1e4497415331e198c693-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f94502f5-3031-417d-a361-2a642ee13433 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clf7fae36684632e1e20674e7cf07fda11-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=131af270-7ff3-42fb-828e-4133eb5bfe3c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in3cfbb19458c9874140cc7aae0e25853ba57a7b88395a-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=51aee1f7-380b-4ac8-82fd-989e5c7fe9fd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:29:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes3cfbb19458c9280d17a7aa182e9817cdb8f0f491aba7b14e-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e9177d8a-ae23-4f5b-9ecf-507ca08fac56 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-4f84d6507d9d1888a00c0fe6a53f801a-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=61b28294-f013-49e1-895e-c8f7f3b09dcc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-build-image-index-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a784c5bd-a24f-4f7b-920a-ba4b170e6aaa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-clair-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=de1e3768-94ba-4e91-b92b-b3f5f4e6b8cc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull009f5f644651df2573110ee12acc9c14-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e613f3b6-0ad5-4afc-80ae-b1a7033b8390 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-sast-snyk-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59a20e04-7e9a-478a-8875-d2543cb53c7a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-e580cef181c52025ecae634e7c6123eeb9279ea8b657bb55488dee65-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0a742795-a3e3-4d3a-893f-e97cd95e1e6c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-clamav-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3db516a5-998d-41aa-a727-77b3eda9d08a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-sast-shell-check-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78ed27d5-22fd-4c2b-b50b-8e59aedae84d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull5b488f3544f244df4d321d3ba886cd44-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e45d74e8-1710-4260-9992-64e9a1b80b8d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-apply-tags-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e849e3bb-85d8-43df-b4b8-e5da13e3b8cc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-c8xv7-push-dockerfile-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a997744-db49-4de9-a22b-6140f74c8e1e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull32311c8003af6bd48c777c10f786d768-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f6d852fa-08ce-4aea-b4b6-b985867b7944 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-5880350d41f0d44cab50ec028a9597e3db74911130cc6c-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6a1f2a58-4e4e-4492-812e-fd2a2a32423a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kxk7x-clair-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fe6c41f1-09bc-409f-ae43-8daf187324a8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-249d8d80511a863253d0d73f49b6e391-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=56b0f72f-11d4-4cc7-b6a3-0041c130e38e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-f9a05770036391d1eef8aa9d8f7d3200-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=81d0afc6-d6ef-477f-a414-d26af3c5bae3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kxk7x-clamav-scan-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c802f3e-3750-419f-8b43-00380187e3df user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytf23826c990482200d06b11d48a7485a1f3b1b651051ac8714e824adf-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bb085bbe-72d2-42a8-953f-eb8eb979a87d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-768abd9e960b7a4f7d03044fc5f4257f-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4cbf8db1-c59f-4b70-bf1d-cec2016f6e62 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compof23826c99048220d7c4cd1a51cb79b369bf2791ea6687e3-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0b850125-2b0f-4610-bc12-8a087d0851f5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-kxk7x-apply-tags-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e472fa90-3079-4a2e-97cf-248077d499f2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-53bc9355dbe888db5c2cb40c20d9b9cd-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=98434fd4-4b50-4771-97c2-7cd100d71f32 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:30:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compf23826c990482200308a6f26efa88774241dcfc8f0a3d40f-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80a64284-3353-4c1e-87d2-418a82b75d78 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra58803505c3a3807e127267dcc4e1a7e6ce87c3f-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a61fde96-9bdd-4e06-b5e0-e99651f3a262 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clff7ef42dd9cfd47d6f7cfd4f49e66f12-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7e87a759-67ee-46ba-b0b3-eb084ed65ea6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in5880350d41f0f75afb8fa2156c29710e35ccbbcdf528-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59e17825-2ede-4fd9-83c1-0c5110a568f6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr5880350dd4f5857feb4279b013ce6506e686717d-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1e3000b2-c833-4650-839f-7a080976fb42 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon5880350d41f0d401aa511b67f45b6875c4675e21028b6c8dccc7f372-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ca1ba104-a541-47b8-a3aa-d8b322f16922 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i5880350d41f0da442e20a7d1a71308941b2c3e0fcccb6-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80fa36e5-e217-4535-96ef-ccbb015602a5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test5880350d41f0d40f00c7b7cbea9800d20143b1f699758a0-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ad4ca8f5-8b18-4ad4-89e7-9567298eb1f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra5880350ec77345bcb9d13fa7fc86e5e3c811053-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7d718de6-e0fa-4bcf-b9e1-7a326fdb12c6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in5880350d41f0821828e8eae0f40cd2f103de46b0b871-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b30f953b-d7df-4366-b4cb-16d3c6d32b26 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:32:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes5880350d41f0d401c558790a7ea0fc25d3e79a3fdb8e9a6d-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f6ede968-718d-4d1b-98fe-186c13f2066b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-b88xz-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3b85312e-4e25-4351-b392-9a06086e9ffe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-pull-request-vt4xs-init-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1712f794-0af7-49ad-b733-086f67ede821 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull257d8f4209ff08009d157e6e44d09770-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=feeb35fd-be8a-4679-9836-73237d5e38ae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co6799625694c443e189606c15e9bae8a6d9378d8f65e1b19581-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ed131a16-d3f5-4a5c-b765-0a005c4b1f6d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-mxllgi-on-pull-request-b88xz-build-container-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=96e3be1d-b547-492a-8393-e71109acd0a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:34:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-ojohvk-on-35bfdc5a656486c905ccd9f83e5fd8e4-pod namespace=group-jcmw operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f8f841a0-22b5-4fc4-8aa4-c5458ca022e5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=4ce46489-7ffd-49f6-803e-0d0683488a4e"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["09b173da-8456-4397-a37a-0a698edd1d6b"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hpg7q"],"authentication.kubernetes.io/pod-uid":["94c77e2b-1463-4218-be21-d6d2a5937b57"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"cd92b542-dfc2-4870-b2ce-91a662d5845e","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T18:35:12Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-02-12T18:35:13Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-12T18:35:16Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:452 > Error retrieving lease lock error="Get \"https://10.96.0.1:443/apis/coordination.k8s.io/v1/namespaces/kyverno/leases/kyverno\": context deadline exceeded" lock=kyverno/kyverno logger=klog 2026-02-12T18:35:16Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:299 > Failed to renew lease err="context deadline exceeded" lock=kyverno/kyverno logger=klog v=0 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:90 > leadership lost, stopped leading id=kyverno-admission-controller-877795fc7-m9m6r logger=setup/leader-election v=2 2026-02-12T18:35:16Z ERR github.com/kyverno/kyverno/pkg/webhooks/server.go:316 > failed to start server error="http: Server closed" 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=global-context-webhook-controller v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/setup.go:30 > shutting down... logger=setup/shutdown v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:50 > stopped logger=admissionpolicy-generator v=2 2026-02-12T18:35:16Z ERR github.com/kyverno/kyverno/pkg/controllers/webhook/controller.go:469 > failed to update lease error="Put \"https://10.96.0.1:443/apis/coordination.k8s.io/v1/namespaces/kyverno/leases/kyverno-health\": context canceled" id=0 logger=webhook-controller/routine 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=webhook-controller v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=admissionpolicy-generator v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=exception-webhook-controller v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=certmanager-controller v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/leader/controllers name=celexception-webhook-controller v=2 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=global-context v=2 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:571 > Stopping and waiting for non leader election runnables v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:575 > Stopping and waiting for leader election runnables v=0 2026-02-12T18:35:16Z INF github.com/kyverno/kyverno/pkg/clients/dclient/discovery.go:103 > stopping registered resources sync logger=dynamic-client/Poll v=0 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup/controllers name=policycache-controller v=2 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T18:35:16Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:124 > terminated logger=EventGenerator v=2 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T18:35:16Z ERR github.com/kyverno/kyverno/cmd/kyverno/watch/watcher.go:124 > Watch failed error="context canceled" logger=klog 2026-02-12T18:35:16Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:35 > controller stopped logger=setup name=kyverno-events v=2 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:326 > Shutdown signal received, waiting for all workers to finish controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:566 > Stopping and waiting for warmup runnables v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:328 > All workers finished controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:583 > Stopping and waiting for caches v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:587 > Stopping and waiting for webhooks v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:590 > Stopping and waiting for HTTP servers v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:254 > Shutting down metrics server with timeout of 1 minute logger=controller-runtime/metrics v=0 2026-02-12T18:35:16Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/manager/internal.go:594 > Wait completed, proceeding to shutdown the manager v=0