2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-14T06:29:43Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-14T06:29:43Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-14T06:29:43Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-14T06:29:44Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-14T06:29:44Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-r76pw logger=setup/leader-election v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=29813f84-db29-484d-bb36-37a9d9273559 v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=7fbddda2-286d-4a09-b11a-edffb3dbffde v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-14T06:29:44Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-14T06:29:44Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-14T06:29:47Z INF github.com/kyverno/kyverno/pkg/logging/log.go:180 > 2026/02/14 06:29:47 http: TLS handshake error from 10.244.0.1:54930: secret "kyverno-svc.kyverno.svc.kyverno-tls-pair" not found logger=webhooks/server v=0 2026-02-14T06:30:44Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-14T06:30:44Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=826fce60-3079-4f93-8443-947a7f1d0937 v=2 2026-02-14T06:30:46Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=7e411671-dbc0-4fd3-86e0-8f08635b9e55 v=2 2026-02-14T06:30:46Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-14T06:30:46Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:253 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-02-14T06:32:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=25b16d07-ec0b-4dd1-99a8-67aa37f3d693 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:32:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=c0cfb428-af00-4e68-ac27-332c23c85ab7 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:40:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=stat-rep-nman namespace=stat-rep-nman operation=CREATE policy=deny-virtual-domain resource=stat-rep-nman/Namespace/stat-rep-nman resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=95f23841-d808-49da-998f-3440f310cbb2 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:40:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=gitlab-rep-ugno namespace=gitlab-rep-ugno operation=CREATE policy=deny-virtual-domain resource=gitlab-rep-ugno/Namespace/gitlab-rep-ugno resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=35e3be3d-a46c-483b-90af-d995249059a5 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:40:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=group-zegb namespace=group-zegb operation=CREATE policy=deny-virtual-domain resource=group-zegb/Namespace/group-zegb resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=49b3b853-b8e2-4f4a-b94a-c868b9c6b584 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:40:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration1-ikst namespace=integration1-ikst operation=CREATE policy=deny-virtual-domain resource=integration1-ikst/Namespace/integration1-ikst resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=54fa5b5a-53d0-4a7e-a982-3f358be78cf4 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T06:40:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-on-pull-request-qhzxh-init-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cb8b13a3-c811-4e44-af10-82ecfd15ad1b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-on-pull-request-78d2x-init-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=536b0baf-d722-47b2-9f85-af238440e261 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9fec4879-27fc-426b-8da8-aa2a05629744 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp6b9149ac68da1b24d1be6ead0483972bc2ca2af4a915734647-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9d9edb75-9d55-4e27-b543-25b3c7a46b2a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nivtre-on-pull-request-df426-init-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=16fea1f6-7341-450f-a337-633fac6e075c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp7cf50d525b3da7cb8fed291d0b3bdcffb5be9d2de879795e9b-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18e3e649-7b5c-42d9-9276-8d6745de5e99 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:41:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull14123b08a1076a140f93e0ae46bb9378-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6641b3a9-6d2c-4eac-b537-3aba83bd5122 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:42:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-build-container-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7bc62f4d-79c8-4c7e-a261-45253ed5ec68 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:42:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-o7df982cafa1606662bda6d9f5470dd7d-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a98e2297-7be1-44a5-8f6b-d5936b6e04d2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:42:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp3404fe9a2a5b8678157c6f65b0a5e481f5c4e974ab31766ccd-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b8a7e986-d043-44e6-8238-2b7867ef0bdc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:42:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-oae2bab5c3081dc8dad959d5097f2adeb-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=095fa946-a8a1-4144-9d8b-625f15d022de user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:42:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g3404fe9a2a5b13c1d4bc4ab38bffbfb8191a20d3a6e6-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f5316c46-a0ef-4ab7-92d9-31a48c74b1eb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:43:38Z ERR github.com/kyverno/kyverno/pkg/utils/runtime/utils.go:101 > failed to validate certificates error="Get \"https://10.96.0.1:443/api/v1/namespaces/kyverno/secrets/kyverno-svc.kyverno.svc.kyverno-tls-ca\": context canceled" logger=setup/runtime-checks 2026-02-14T06:43:40Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-14T06:44:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac3404fe9a2a5b862501eecfc63e7bf0b8d6bd90f360471c-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d819f47b-cc9e-4682-8b08-125e07ce7050 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen7cf50d525b3da7bc23e16991b301a1fe128b7001dbad66-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8bdbc28d-d814-40e7-b236-94c1890b2ebe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen6b9149ac68da1bc459057330f42ba2971f555c282aa926-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee450bf9-e6f8-4039-82c0-aef24a5e2301 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-on-pull-request-78d2x-clair-scan-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=214a04d0-ee91-4cd6-ad71-96db65395c74 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-o1f49dcb5b61ae8bf8f444230878ebc54-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea81497b-79d9-4f56-b733-e21ed0dc4002 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-o0fb5ebd6e75cb05648bbf0f660fd0812-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b5b07c16-4bf3-46ba-944f-538500fb83a3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-on-pull-request-78d2x-clamav-scan-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a96eaec-62db-43bc-a8e2-c28b4826a7f5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes7cf50d525b3da7cb8fd58f5e796caea39a74d6ead49b5de8dc481692-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3528aeb8-2531-4680-bece-16b89796b009 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component7cf50d525b3dab7490ac3279aa1cc5a286390855ac543-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fab27ea3-f8cc-43dc-9c65-8c4fe0520239 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone7cf50d525b3da7cf8496b79bce7c709e37824e79a6e1539-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f72c9b57-f87d-4fe3-87f0-a1c5376d75e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-on-pull-request-78d2x-apply-tags-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=26f0d4cb-ef89-4555-a85b-9ec834401366 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-uioaqx-o0f11b899ae34daff651ad37a3ab3c2b3-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=522db748-7906-451b-a45e-3600182bb197 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon7cf50d525b3da7cb2f9764dadf9c399e747f0e21f77d1797-pod namespace=integration1-ikst operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c711e324-f66e-4e22-a5a5-c3c9074958f7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nivtree0e98d18162f4df3f2bdbf96f2ce51d1-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e840da21-ca6e-4e34-b906-b7cd5679cb89 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nivtreeba18e76797e9f3478c435402cdd9e64-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2d00b7d-2ffc-411b-b7aa-abdcb19c71ec user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g3404fe9a2a5b069b0161fad055acffab5d36b37b0744-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c145f90e-ac15-481e-983f-a2d5b0b39cf1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nivtre0a460971484aed16f36fea6e08ac74e2-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7dee95de-0856-44dc-88fb-d62f2f2d19af user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes3404fe9a2a5b867815aba82181c29f096aa8b2077fc1aabf56bddca0-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dd32e0b1-3e54-499d-ae41-28a02b409767 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-3404fe9a2a5b820dc9f3916f29bd3e16397b76b140365-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7932dc2f-4f2a-45f2-86d2-654de8229aa3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pa3404fe9a2a5b867eb683b1093094f31d7d11e0e967317d5-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=539dd59b-0feb-4e96-93e9-92dbbd44c832 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-nivtre9da5c64cd28c4ef3a948bdbeeeefb9e7-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c424dc9f-4f5b-4e98-9264-69b01b496eb6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g3404fe9a2a5ba4c60e35b8dd1cdd1790e1561323bb2b-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cc6c24e6-c3f1-4343-8935-a1639370c7fe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-p3404fe9a2a5b8678bd9b7ff08ca335c5f8ff8797f189aa87-pod namespace=gitlab-rep-ugno operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bab243d3-286f-4221-84ed-3d0bbc597367 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:44:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-on-pull-request-qhzxh-clair-scan-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=276bc184-4eab-4eb2-bacb-936787b76594 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-o1cfec98cf1c0651c82f9a246f18e5a3a-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=66dec41f-47d8-4d7b-8897-437cf3935628 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-o837a1c52e15564f127c8af9d7b86cedc-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0051e3fa-1780-478e-9016-6e3066398ffb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-on-pull-request-qhzxh-clamav-scan-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3f2f44f4-83b8-4c1b-ba8b-692f45a6742a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes6b9149ac68da1b24d17340d420509863b1e90196b436c8da83c03b65-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2663ff3a-bb37-4a6d-b781-c2da71ba6c74 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component6b9149ac68da1ea57b6dbe88814d981e9d870a0256295-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8c878624-5a9e-49de-8a52-4466965b56f4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone6b9149ac68da1b2a77f8af04fd804505bd07eab74b245a7-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e836e03d-4956-4f68-a98b-668708659d8e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-on-pull-request-qhzxh-apply-tags-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4e8e0ead-e713-4bc2-af76-a97941c2993a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-o7e988a1b5ae81fe4360b8745d2e0b183-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a3d1f08e-932e-444a-be67-67300fe61e30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon6b9149ac68da1b2423d907635bbff3059fbd70df023fdb7d-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a91363c6-51be-44ff-98fc-76ac270cddba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-build-image-index-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ad4b64ad-3bc4-4271-a5a7-584f6f4b2a30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69c7ec01-c2b9-4ee7-bf1f-bb80c0ef0353 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull9a0cbd25bc8e1bf2cf557e4fbd484a98-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bfc05bab-4dd2-4b95-bc51-f852f8645c93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-sast-snyk-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e9f70d12-42ac-4b5e-b134-6b753f25c1a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae252d62-e4da-4aa3-99eb-9a6a65786a19 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-2ba4ddc38df89d6e092910d29aa942c96e88c052f0fbb5bc715d84f9-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aa9d54b5-9dc2-4d43-98e6-12ccfb89fa93 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-sast-shell-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=205e1cda-239c-4c71-a1d9-e2a86c4bd208 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull4044105f176271fb8d9d42cab237c336-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bfaa92a2-ac9a-4a6b-8ab7-1a11e8946a97 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8e9c748a-54a0-43ce-ac06-f48fdc89cc95 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-fgnph-push-dockerfile-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=548eace5-4e23-4b81-b6d7-4cbfb7cbf47f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:45:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull87bfde888ab6c8af74d7a8ad891fcba1-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee0ce28f-f26a-48e3-b410-f2dd4f73320a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:47:31Z ERR github.com/kyverno/kyverno/pkg/controllers/webhook/controller.go:469 > failed to update lease error="etcdserver: request timed out" id=0 logger=webhook-controller/routine 2026-02-14T06:47:31Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-14T06:52:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-dzrd-task-success-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ce339ef2-f213-427e-91b2-f2e83241964a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:52:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-dzrd-task-success-2-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=161a65b1-989b-4aec-ae62-0818071195d2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:52:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-dzrd-task-skipped-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ca773a99-75b0-466c-baff-45d4b17e9a2f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:52:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-rkmqxf-on-push-5qpnb-init-pod namespace=stat-rep-nman operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=04cffc15-03d1-4f78-ac69-b4c5fb15ff16 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:53:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-bdkkl-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=512d3eb7-c3bd-46ee-8641-9abff375b1f1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:53:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-coe6a897449eae8beac388e9e728c7b361a3bab5a7518f1cf617-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9a79244a-b448-4db1-aa6c-5d792478223d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:53:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-a6f812e5c64fdca4c8936eccba12729a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4a6f5823-c2d4-4b7b-8663-8745caa058b2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:54:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-0e3129f7cb5078500ed632900f2e1738-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=367e977f-973a-4f4e-a227-9f7dc50422b9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-bdkkl-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1aa47c93-bac1-4de1-9f82-ab5c0ab0e13c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-361910141a3ac2d1335881f7d86ff635-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=681698a9-ba60-4985-b405-933523fc99b4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-6a7448c29fdd593c64ae929d17b94d83-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=95b9c903-95cc-476c-8338-06dfff55c237 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-bdkkl-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3392d7ba-aacd-4beb-994b-70e75076d0fd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyte6a897449eae8beac3296cbd25cccdbf331d8bb5afefbb0d06a43639-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=33463c05-ae06-4fb4-8732-f357b79adec4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-b1861b8932f347b4d710d2da6d0bebdc-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4b4853c2-1bb0-40ee-8148-6e45644348e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compoe6a897449eae8be1733f591be6f6fd645297f4e11bf19fa-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5cdc5754-303a-4f23-aadf-5adb69628b87 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-bdkkl-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=317f8064-75cc-44d6-b247-59e185bb5450 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-39ee69eb19cf04d3ac895db1a5c06ed1-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=befa1617-77a7-4cc8-9a39-1f69417491fe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:55:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compe6a897449eae8beab1e3141e46d440ac14c61e9c154d89a3-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d964c15b-58d1-49e9-acb6-14d2fe016e11 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=82d3c5a6-1778-40de-bcbb-5de01c5839ee user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c25a79e8545449407b8b3693ac1751fa3b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1d99c769-def0-46bb-837a-735fc23858b9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-prefetch-dependencies-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e30968a5-de84-4329-9879-7bcc9afada02 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-build-container-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c74bb82-43a1-4e0f-ae38-9ced06a6429f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t27759fbacafc83f2ff8622f7f0145cce6ae3275fb4c699f0ab-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebea042d-0dbf-48a9-ac5f-e65afdb0a86b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:57:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in27759fbacafcc3a5a7ddcc90ecabf22acadb9417161a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bdea9e18-1887-41bd-b713-6e4527c360e0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-build-image-index-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6950cc16-e01c-485c-8da9-46e45789843e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e2772d9d-491e-422f-a304-7d43789b1fd8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-b3665f200c41b007ec93d247ea6d3f9d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3775cb0a-cf31-4813-a7c7-48bef7deba74 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-sast-snyk-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=60ec9f43-3189-4bef-9112-083221ca5a4f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c5eef52-81d3-4d11-98ad-81a2fd6c2d85 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt57ca151eeac618b2bbdb09214cc12bf09f647163c5e400332ee748f5-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=70d20a4f-7418-47fa-9c39-3200d8b81966 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-sast-shell-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59c5d6e0-72da-48c1-beeb-9bff2d38de83 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-sast-unicode-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=797e59e0-5497-4585-9fd0-6a5fb6ee0cf9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=af8a1e11-830a-407e-b3c8-d5a8520f2553 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-push-dockerfile-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=490e5c07-a1bf-4536-8f03-53f724a7f72d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-push-2j528-rpms-signature-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=89d663be-5f07-4120-8a1f-884864a1e96f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-27759fbacafc83607ce71969967c652db299cc1524855f-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e99ec388-b11a-4370-bd63-8f55c09210be user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra27759fbe9deba57217516d192a3f1f0d78bceb7-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a4c3bd82-37a3-4e0e-9328-a18799229b25 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl86da2f40adf0936b2085b676566f8d17-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=931194dd-8a91-4fe0-9aed-4ae9f9bf4dc9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in27759fbacafc0c7e975d0d0b295cce3b3d7b1613c5c3-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=162039fa-0208-4417-a8fe-218e57ba508b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr27759fba34888d9ccfd539fdb64642afc1c8e8b0-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=aec24aee-0a35-4b0a-a175-c7747c744607 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon27759fbacafc83f2ffe126a964ee323fc978a7ce05b27eb883e06ec2-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=082be5db-01e7-4136-88e7-ed01d62f8528 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i27759fbacafc8e0808771b108bd58e3b560fe3d55f903-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=db019f3f-acfe-4bbf-93ba-6a9a0d15012c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test27759fbacafc83fc956693995169fd9437d986d908b7c99-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=28b43eae-3319-4bb5-835b-c31c52da5276 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra27759fbc9e29e62b4342b2255381115fe4a9fd8-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1a740f48-554c-4c97-80bf-fdc47e8dd10a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in27759fbacafc9b2236c557d59a2d654b0e1e573e85c9-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=40a1000b-895a-4a23-9775-25dc2f6f079c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T06:59:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes27759fbacafc83f2eda93c71974e4fb77914ac66704d8970-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b6121edc-9996-48f2-bdf2-382463669f65 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:01:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration2-ibto namespace=integration2-ibto operation=CREATE policy=deny-virtual-domain resource=integration2-ibto/Namespace/integration2-ibto resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=a96467b5-b928-47a2-a6c8-4d56468792c6 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=99279ad7a782871e7fb2ff9c0b6da3c8141e890ace00791a6d7decf45e40874f"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-14T07:01:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clone-sqtacg-on-push-qtwwf-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1fc501c3-a14f-4439-9517-7b2146e6cc56 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:01:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-z5skc-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=545b734f-9097-4710-b309-338976dbe380 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:01:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=14071d54-f9d0-44e7-a3c1-6ba0c67cc167 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:01:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c788d2e5bf5b1365bc17c347b504d0adb1-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=71aa7dba-7362-4472-ac1b-3052f2cab181 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t45f9753dc31a8044a570798e984f6cbdda040600625c2832f3-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d6376dc4-e88c-4a0a-90eb-9f69e74f3253 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-cob1a2a5bd4fbae74d6fdd7a0e426536bef003b3533786d08244-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=46d3a80a-e440-400d-99f5-13a81a75d2ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in45f9753dc31a3cf110c1f95e94fb777e32646d1341fe-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=45ab2b29-06fb-45b6-b427-b03bcf50fa85 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pullb3f9b184372c1080869d599affe5333b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=81ca1a62-10e6-4be5-93aa-0b6fd82faf0b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t71320bc23666e56d68866762adb34fbf6a0090ba9304dcd75d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e90468b9-4917-49f3-b87d-dc367736f233 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-4804caa21da9b9a85c68911207cc6845-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d56b78ed-ff2a-47f6-8077-20a0f483d4d2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-build-container-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=39f2f2e2-3700-4b05-a417-5ed963033a74 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in71320bc23666b532b30c67f2cef1de7df448be399aa2-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fac79983-1c13-491a-84ad-17f126d7bc17 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:02:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-on-pull-request-9hlp7-init-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bc5d1b04-35dd-4209-a55d-45aebf1d5d6f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:03:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp499190e7a4c1028da9b16582765fd6b965ad761a8306a737fc-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0e782a0f-264e-4d52-8f31-31c8062d80e4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:03:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-45f9753dc31a80e0a64bba4c035a2800b0fc046fcfc56b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cff1f6fc-0a0c-4688-afe6-2fa56335be61 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-o99b79f1cb661ef029ea3c054689c2e33-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9fc08044-c9f0-487d-b346-7192aedae8ef user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl3065cac79b94b3556fa11e40fd1ddb3d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=06d01be4-d54e-4d50-8e97-2a5f77c6c089 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl5c46063c235b2be7d09c4a841e04e858-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd91161d-b46a-4365-b434-c5cda75eea6d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in45f9753dc31a6506de839828532f928cc9030c786edd-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3e41377a-57ec-41c6-ae5a-d5eb9ce1394e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl6d659d3ef34be9c1187ccb325baddbff-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b69ab4f4-069f-4029-be79-0398e3b74b28 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon45f9753dc31a8044a5347088aaf81e1f7de9c55478218ca3fd668998-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=01f2eedc-7c28-4db1-95af-328d22cfc4a3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i45f9753dc31a80cd90446ade9fd9ed049bb546905b86a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6addab51-975a-486b-b4d9-29bc16a3e5f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test45f9753dc31a804828a2156430b820f210cafd38fce6444-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=073e10f8-0a95-4334-a5b1-c4ff245b469c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clc54e599118f2b2aefd0acc148d012e7b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f4145bb7-0249-44cb-9f6a-5846999336d2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in45f9753dc31a60961c99c5f50f268d2818a1e1d16566-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7ecca4ae-d829-4607-bc70-38f126082786 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes45f9753dc31a80445884ebe41ead85bbfbefa3f11fb1d473-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0bf28919-4e11-4f18-b988-869c5f2a73c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:24Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-71320bc23666e5637dead6250b689c6a3aa2a91109fc48-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7ca64f9b-7fdf-4707-9cb1-9357018462c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-ff26eb99ae6d2b984cdbbce139ed174a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bf5b4ff4-f8dc-43bd-b958-598be4192ec5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:04:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-build-image-index-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=726e3efa-cc46-4ac9-b93e-5fc5b74df5bb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra71320bc97aa2c0042dfc7149d944ac1e403d94d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=09d0d134-d15d-42cd-9859-371f0e99632a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in71320bc2366699fe72347f9e981aa8cacec142483f8d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=658aa46a-0e5f-46a5-8bae-47c9687c44b7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl57174721cf2ec866507f4ebaf27cfe6a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=23018ce5-da0b-407c-8146-1d6e25391624 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr71320bc26d3b46030913d48a17212870326e2257-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ed606e55-edcb-401b-81ae-6367b363a753 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon71320bc23666e56d68c67bb1fe01d0d36fb0420a4cdb01211e787a52-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6c1b1663-9ce4-4cf8-8bf7-c9c6d870ed5c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i71320bc23666ea04e1f210987f3c7822f948a02103acd-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4df0d8ab-8aa6-4826-b036-da123c96ee66 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test71320bc23666e5698b9f0ed03cdea7c151eddc7b6a16dfe-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=38efa6d3-7081-4125-9663-ff7dcf8d18a7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra71320bc5840f03876eb9cc9ab6f18e7428f7d41-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2d3ca51-1b0a-4af2-86e6-d0f575537003 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in71320bc23666ceb3f083992b606ebd9e1626f58da1e4-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5f5d2afb-7108-4d80-9326-42d7ba69d9f7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes71320bc23666e56d04c221e08a418fee263edba9113dfcdb-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=acc9ca62-1ed5-4140-98ee-1ce117c081ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-z5skc-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=70a28061-53bd-4d48-8668-3e7c0a28728e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-8ebc6d77562fbc17556121900e94ceed-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=030018a2-c321-4739-b7b0-cd2d82634a7e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-z5skc-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=506a8ea5-bd70-4c4f-aa37-e351c1fa1e26 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-820ef6181cbded625b9fc14bd5b554ea-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5ae50a2d-a2c9-4519-908c-a195884eaccb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pytb1a2a5bd4fbae74d6f0e1f9e387a5f97b4ea3317db9e5d9e9ab250b1-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0e767afa-699e-4eae-b53d-5993eee74b17 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-da2cb6f96f855a9aaf0ad384ae7d295c-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0d02d425-075e-485c-9b1c-006d32d91d20 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compob1a2a5bd4fbae743c784af042a2d70b65ff29bcb81e384d-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=32792ea9-58a2-4959-b279-712606c96831 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-z5skc-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ba37722c-21bd-479d-91d8-23b7fefafdef user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-65fd5b5832a49851fe19deaa8b570975-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f2fdd27-6206-4910-a91f-0e7f82503147 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compb1a2a5bd4fbae74d9d9bf860fe8527f2349b6d8c3698adca-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=90cfa0e9-72f7-4435-baf5-9de46d4fe180 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e9b90bc6-3d33-4d02-aa27-0de35a62e772 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-sast-snyk-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2aabeb01-806a-497e-a287-842026ef5fd2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull37870718eb0e6f8c1ad43c66ac72aa39-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1a7fa6d0-d242-463c-b704-64f120853121 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-b594b7d514e56a899d06f8625c152f116eeef89f9cc97e1f07e2b356-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2724a40-a4aa-4f8d-9fe0-201b2f4d782e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a3f71d60-97bd-49f2-8a86-04aa2b2a2a94 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-sast-shell-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=181a1949-b6de-4dff-affa-5e9d711016f9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pullaeeb83df62bb267f480b768b929c694e-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=44f8f5c5-c9d6-4f4e-ae59-91ebeba27d19 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f14f73fe-78b4-4a0f-8960-e8c2ce781ff7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-9xtfh-push-dockerfile-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ba6b8ba5-f9d0-49ce-ad51-15e38b1d074b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull0d4be47d10cb371c9a38444700697206-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=621be26f-3629-4388-8ebe-ba04e2016bc5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:05:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen499190e7a4c102ee93e74801f3a95ed950a7e3e92b7af9-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0612605d-bfd2-4603-b4ee-64d8db2f5d6c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-on-pull-request-9hlp7-clair-scan-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69877e9d-52ae-41b0-aeb9-182cfe503f58 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-oe85376ae20fb0a1d584e24c985204c87-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=918fa252-90ee-4da7-af51-2d01c6d02bc1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-o735ccba9d4793537320e96e715cb5fdb-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=abc016b9-b99a-406e-835e-1a83316255a2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes499190e7a4c1028da9bb76fb98b24e81d1784c97f888ba6ecaddf93c-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=bcdb0dbe-9166-4444-82e6-e99b9caa5970 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-on-pull-request-9hlp7-clamav-scan-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebd36737-cb51-4586-9b5b-8291ef0e7df5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone499190e7a4c102811cb0f02d5c5c7a6e102a3f8d4559f93-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=59ca383d-3a0c-4e6a-9c00-6f40fd57a864 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component499190e7a4c109c3d70bc019380bfdd439eb09163bf8e-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c9c44743-d1ae-46d1-a50e-c2a86bff27f8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-on-pull-request-9hlp7-apply-tags-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebb65b41-4042-43f0-a662-66082006309b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-wpnxbi-od13f8c3008c45842b8ce522c244c85ee-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=87d8df3c-1b96-4307-b9b0-40a363718a52 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:07:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon499190e7a4c1028db86efd522f3bbf952f9ef6328bc001d5-pod namespace=integration2-ibto operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4c6a0555-2230-4f6e-a956-fa536d83fe23 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-9hb48-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6129e111-ae32-4183-abb7-4b32ec2b713e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-init-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b33da7e4-00b4-4d3c-9be0-3ae61df44c25 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull7efaa708accdd4344cf643d2d7da7bf8-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8ade705e-7507-40b6-9523-0a4b4ea3a9d4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co2a0d807964803cc1a6c051ae9d9f17f3433ba69cd537664ce1-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=22991a5d-e1c9-4c83-9909-3d337183d913 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-build-container-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4d48eaa3-5dfd-4e29-b823-a8b31e85f96d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:09:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-e810a04f15a92b962aa1c8349c4845a2-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=472783fa-6ae1-4a13-abba-318c4a3b21fc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-e5c0fde7b78aa7878d5c07f57c511c5b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1cba801e-8e86-4160-866a-cae7565c3e31 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:39Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-build-image-index-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8231d951-5b65-4cc8-8d08-38bdd84ea7ba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-9hb48-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0e404dec-b260-4872-b4bf-2905d467376d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-cee0c635de6e46f95ec0b7a85453755b-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=869a7991-8a21-4edc-84c0-443c01b609ac user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-c725038b2835a284a7ee48d45ec43c51-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4de88f3f-0569-4236-bdf3-d2cc32384c01 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-9hb48-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=77b2bec9-e8cb-4fd7-9d90-782e1f5bf5fc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt2a0d807964803cc1a691fc8a857c7bae4bd231fa0151197b5737858a-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c209a52-ce7c-4406-8d08-3c1a1db20082 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-3ef2393deca9668a4469b6917c7ff740-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=94e0b3fc-2648-45ea-b768-92e185525ec3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo2a0d807964803cc397b0d231216254246c572d970be82c2-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae5fa679-5f1e-45a1-a9fe-2eea9379c704 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-pull-request-9hb48-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2921d053-cd9b-4b0b-9d39-5ac55d71b98f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-kbyrtd-on-f7154070ff33fb4030e5413b6be70a6e-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=144edc85-79d7-4ee0-b52e-7ae4c8297b24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp2a0d807964803cc1707218b11856897a1e416e0ffbc57032-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3ba4786e-d4bd-4493-b8db-2a5bcf56c4c3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-clair-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=06d85cbb-1921-42ea-8ea2-fc78d0471690 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pullc6db3c5faa4e515f2b836f91ad7663f4-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7b6eec2e-a216-477b-8a4d-aadeaf47b210 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-sast-snyk-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9543d007-5aea-4fbc-a72a-a6b397251045 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-clamav-scan-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d95c75ad-207d-479d-80f5-d9a19ffa9caa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-c0265fd18f147e8db1635a706fd9b6c891944d1b301b2b4bb9fb1456-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9926674f-8369-479c-8544-ebc190834863 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-sast-shell-check-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5d71ff39-293f-4b8d-b681-75118fc97f08 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull25180a2f891ee82557cdce5d74b9f282-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=84929ac3-f23f-45c6-a8cf-8c77cd408748 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:11:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-apply-tags-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8d66c316-cf82-4e40-856f-28d54d561fc0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:12:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull-request-2lhnq-push-dockerfile-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2e5944d-add7-4e3e-8d93-43111183094d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-14T07:12:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dlbzyt-on-pull776e02155a86fe1da6c14ae78915a901-pod namespace=group-zegb operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=146f3300-7e26-4033-946b-907a54118ac6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=bf41e49c-3c2b-4a4f-95cf-bfe5ae84a186"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["8ca5c8d8-f863-464d-8a13-dea78d25809d"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-hn428"],"authentication.kubernetes.io/pod-uid":["0a831719-7219-45d9-8e00-2bac6604479e"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"c96a2328-bcbf-4df4-9ac6-0f8904eeae83","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2