2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/version/version.go:49 > version hash=3e5e775669753daae01e280298f85b4604db9198 logger=setup/version v=2 version=v1.17.0 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > add_dir_header=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > admissionReports=true logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowInsecureRegistry=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > allowedResults=pass,fail,error,warn,skip logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > alsologtostderr=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoDeleteWebhooks=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitEnabled=true logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoMemLimitRatio=0.9 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > autoUpdateWebhooks=true logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > backgroundServiceAccountName=system:serviceaccount:kyverno:kyverno-background-controller logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > caSecretName=kyverno-svc.kyverno.svc.kyverno-tls-ca logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerHost= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > cleanupServerPort=9443 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitBurst=200 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > clientRateLimitQPS=100 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > controllerRuntimeMetricsAddress=:8080 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > crdWatcher=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableLogColor=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > disableMetrics=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPatches= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > dumpPayload=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableConfigMapCaching=true logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableDeferredLoading= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enablePolicyException=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableReporting=validate,mutate,mutateExisting,imageVerify,generate logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTracing=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > enableTuf=false logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitBurst=2000 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > eventsRateLimitQPS=1000 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > exceptionNamespace= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > forceFailurePolicyIgnore= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateMutatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > generateValidatingAdmissionPolicy= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imagePullSecrets= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheEnabled=true logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheMaxSize=1000 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > imageVerifyCacheTTLDuration=1h0m0s logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > kubeconfig= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > leaderElectionRetryPeriod=2s logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_backtrace_at=:0 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_dir= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file= logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > log_file_max_size=1800 logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingFormat=text v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag loggingtsFormat=default v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag logtostderr=true v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAPICallResponseLength=2000000 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAdmissionReports=1000 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditCapacity=1000 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxAuditWorkers=8 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag maxQueuedEvents=1000 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsHost= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag metricsPort=8000 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag omitEvents=PolicyApplied,PolicySkipped v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag one_output=false v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelCollector=opentelemetrycollector.kyverno.svc.cluster.local v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag otelConfig=prometheus v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profile=false v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profileAddress= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag profilePort=6060 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag protectManagedResources= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag registryCredentialHelpers=default,google,amazon,azure,github v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag renewBefore=360h0m0s v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag reportsServiceAccountName=system:serviceaccount:kyverno:kyverno-reports-controller v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag resyncPeriod=15m0s v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag serverIP= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag servicePort=443 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_headers=false v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag skip_log_headers=false v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag stderrthreshold=2 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsKeyAlgorithm=RSA v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tlsSecretName=kyverno-svc.kyverno.svc.kyverno-tls-pair v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingAddress= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingCreds= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tracingPort=4317 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag transportCreds= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufMirror=https://tuf-repo-cdn.sigstore.dev v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRoot= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag tufRootRaw= v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 vmodule= 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookRegistrationTimeout=2m0s 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerHost= 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookServerPort=9443 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/flag.go:321 > logger=setup/flag v=2 webhookTimeout=10 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/maxprocs.go:12 > setup maxprocs... logger=setup/maxprocs v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/memlimit.go:13 > setup memlimit... logger=setup/memlimit ratio=0.9 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/signal.go:16 > setup signals... logger=setup/signals v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsAllowCBOR logger=klog v=1 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=false feature=ClientsPreferCBOR logger=klog v=1 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformers logger=klog v=1 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InOrderInformersBatchProcess logger=klog v=1 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=InformerResourceVersion logger=klog v=1 2026-02-12T13:53:58Z DBG k8s.io/client-go@v0.35.0/features/envvar.go:172 > Feature gate default state enabled=true feature=WatchListClient logger=klog v=1 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/metrics.go:19 > setup metrics... collector=opentelemetrycollector.kyverno.svc.cluster.local creds= logger=setup/metrics otel=prometheus port=8000 v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:413 > defaultRegistry configured defaultRegistry=docker.io logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:429 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:438 > excludedGroups configured excludeGroups=["system:nodes"] includeGroups=[] logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:443 > excludeUsernames not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:451 > excludeRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:459 > excludeClusterRoles not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:475 > generateSuccessEvents configured generateSuccessEvents=false logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:489 > webhooks configured logger=config name=kyverno namespace=kyverno v=2 webhooks="{\"namespaceSelector\":{\"matchExpressions\":[{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kube-system\"]},{\"key\":\"kubernetes.io/metadata.name\",\"operator\":\"NotIn\",\"values\":[\"kyverno\"]}],\"matchLabels\":null}}" 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:503 > webhookAnnotations configured logger=config name=kyverno namespace=kyverno v=2 webhookAnnotations="{\"admissions.enforcer/disabled\":\"true\"}" 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:509 > webhookLabels not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:523 > matchConditions not set logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:544 > enableDefaultRegistryMutation configured enableDefaultRegistryMutation=true logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/config/config.go:559 > maxContextSize not set, using default default=2097152 logger=config name=kyverno namespace=kyverno v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/registry.go:18 > setup registry client... insecure=false logger=setup/registry-client secrets= v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/imageverifycache.go:10 > setup image verify cache... enabled=true logger=setup/image-verify-cache maxsize=1000 ttl=1h0m0s v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/kube-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:60 > create kyverno client... burst=200 kubeconfig= logger=setup/kyverno-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:68 > create dynamic client... burst=200 kubeconfig= logger=setup/dynamic-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:84 > create apiserver client... burst=200 kubeconfig= logger=setup/apiserver-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:76 > create metadata client... burst=200 kubeconfig= logger=setup/metadata-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:92 > create the kyverno dynamic client... burst=200 kubeconfig= logger=setup/d-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:100 > create the events client... burst=200 kubeconfig= logger=setup/events-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/client.go:44 > create kube client... burst=200 kubeconfig= logger=setup/events-client/kube-client qps=100 v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/reporting.go:13 > setting up reporting... enableReporting=validate,mutate,mutateExisting,imageVerify,generate generate=true imageVerify=true logger=setup/setup-reporting mutate=true mutateExisiting=true v=2 validate=true 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Secret v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:63 > setup exception selector... enablePolicyException=false exceptionNamespace= logger=setup/exception-selector v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:92 > setup config map resolver... enableConfigMapCaching=true logger=setup/configmap-resolver v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ConfigMap v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/cmd/internal/engine.go:45 > setup engine... logger=setup/engine v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2beta1.GlobalContextEntry v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Deployment v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=reduce-tekton-pr-taskrun-resource-requests type=ClusterPolicy v=2 2026-02-12T13:53:58Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=set-skip-checks-parameter type=ClusterPolicy v=2 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:208 > Starting metrics server logger=controller-runtime/metrics v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/metrics/server/server.go:247 > Serving metrics server bindAddress=:8080 logger=controller-runtime/metrics secure=false v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy source="kind source: *v1beta1.NamespacedMutatingPolicy" v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy source="kind source: *v1beta1.ValidatingPolicy" v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy source="kind source: *v1beta1.NamespacedValidatingPolicy" v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy source="kind source: *v1beta1.NamespacedImageValidatingPolicy" v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy source="kind source: *v1beta1.MutatingPolicy" v=0 2026-02-12T13:53:58Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:370 > Starting EventSource controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy source="kind source: *v1beta1.ImageValidatingPolicy" v=0 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.UpdateRequest v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Namespace v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=controller-runtime/cache reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.RoleBinding v=2 2026-02-12T13:53:58Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRoleBinding v=2 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=imagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=ImageValidatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=mutatingpolicy controllerGroup=policies.kyverno.io controllerKind=MutatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedvalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedValidatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:258 > Attempting to acquire leader lease... lock=kyverno/kyverno logger=klog v=0 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/controllers name=policycache-controller v=2 workers=3 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=kyverno-events v=2 workers=3 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedimagevalidatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedImageValidatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/pkg/event/controller.go:111 > start logger=EventGenerator v=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup name=global-context v=2 workers=1 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:303 > Starting Controller controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=namespacedmutatingpolicy controllerGroup=policies.kyverno.io controllerKind=NamespacedMutatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z INF sigs.k8s.io/controller-runtime@v0.23.1/pkg/internal/controller/controller.go:306 > Starting workers controller=validatingpolicy controllerGroup=policies.kyverno.io controllerKind=ValidatingPolicy v=0 worker count=1 2026-02-12T13:53:59Z INF k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:272 > Successfully acquired lease lock=kyverno/kyverno logger=klog v=0 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/pkg/leaderelection/leaderelection.go:83 > started leading id=kyverno-admission-controller-877795fc7-kk5jd logger=setup/leader-election v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Lease v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.Policy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ImageValidatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicyBinding v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedGeneratingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.ValidatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.PolicyException v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v2.PolicyException v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingAdmissionPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.MutatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedImageValidatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedValidatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.NamespacedMutatingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1beta1.GeneratingPolicy v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.MutatingWebhookConfiguration v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterPolicy v=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=reduce-tekton-pr-taskrun-resource-requests uid=cdbdff7f-806b-4629-91c0-67941446b0b2 v=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=set-skip-checks-parameter uid=05e1618e-23a9-4497-b8f5-1dcbbaf75e04 v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ValidatingWebhookConfiguration v=2 2026-02-12T13:53:59Z TRC k8s.io/client-go@v0.35.0/tools/cache/reflector.go:446 > Caches populated logger=klog reflector=k8s.io/client-go@v0.35.0/tools/cache/reflector.go:289 type=*v1.ClusterRole v=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=admissionpolicy-generator v=2 workers=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=certmanager-controller v=2 workers=1 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=webhook-controller v=2 workers=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=status-controller v=2 workers=3 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=exception-webhook-controller v=2 workers=1 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=celexception-webhook-controller v=2 workers=1 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/pkg/utils/controller/run.go:20 > starting ... logger=admissionpolicy-generator v=2 2026-02-12T13:53:59Z TRC github.com/kyverno/kyverno/cmd/internal/controller.go:32 > starting controller logger=setup/leader/controllers name=global-context-webhook-controller v=2 workers=1 2026-02-12T13:55:02Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=init-ns-integration uid=cdef33f1-9154-4a3a-af20-ab8f8a9f9d65 v=2 2026-02-12T13:55:02Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=init-ns-integration type=ClusterPolicy v=2 2026-02-12T13:55:04Z TRC github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/cpol.go:12 > policy created kind=ClusterPolicy logger=admissionpolicy-generator name=deny-virtual-domain uid=e94754ac-3aec-4080-bcdc-24c90b3ab6a1 v=2 2026-02-12T13:55:04Z TRC github.com/kyverno/kyverno/pkg/controllers/generic/logging/controller.go:45 > resource added logger=setup/cluster-policy name=deny-virtual-domain type=ClusterPolicy v=2 2026-02-12T13:55:04Z ERR github.com/kyverno/kyverno/pkg/controllers/admissionpolicygenerator/controller.go:253 > failed to update cluster policy status error="Operation cannot be fulfilled on clusterpolicies.kyverno.io \"deny-virtual-domain\": the object has been modified; please apply your changes to the latest version and try again" deny-virtual-domain=status 2026-02-12T13:57:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns1 namespace=user-ns1 operation=CREATE policy=deny-virtual-domain resource=user-ns1/Namespace/user-ns1 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=82dceb9b-0a29-46f7-93b3-38f376809d91 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T13:57:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=user-ns2 namespace=user-ns2 operation=CREATE policy=deny-virtual-domain resource=user-ns2/Namespace/user-ns2 resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=57ea5b32-c55e-475b-8155-bf6f8a8448db user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:04:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=group-zgkk namespace=group-zgkk operation=CREATE policy=deny-virtual-domain resource=group-zgkk/Namespace/group-zgkk resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=cd3c3082-500e-4c49-af6c-5900118cdd87 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:04:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=stat-rep-jwoe namespace=stat-rep-jwoe operation=CREATE policy=deny-virtual-domain resource=stat-rep-jwoe/Namespace/stat-rep-jwoe resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=c9cf0038-2baf-4308-a654-64f4c6fdbb13 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:04:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=gitlab-rep-klsx namespace=gitlab-rep-klsx operation=CREATE policy=deny-virtual-domain resource=gitlab-rep-klsx/Namespace/gitlab-rep-klsx resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=760225d5-b507-4dd7-ac05-1c8f40819aba user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:04:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration1-ludq namespace=integration1-ludq operation=CREATE policy=deny-virtual-domain resource=integration1-ludq/Namespace/integration1-ludq resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=0ab79f06-60e1-485b-a65d-7e37112fe472 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:05:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-on-pull-request-7qgs7-init-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9b2c2f8a-3b36-4722-94f3-80c45e79fd38 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:05:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-on-pull-request-4rk69-init-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c52a47e3-7a34-4abe-9a44-30ab83b16549 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:05:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd5b58b8-a411-4ff3-be4e-1663e330d87e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:05:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compfae59321369befca4f9930509ea6b08d7f7671d2783b2794bb-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=265906c4-2365-48ae-a38c-1dbc31e8fa13 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:05:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp8292674c8502b4f9d0857d518f401f917ef5eb7b78d084f144-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d3711e23-acee-498a-998e-51a0dd02b247 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:05:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pulla786194197a233643215127873000958-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=156eb065-995f-42ac-994e-4f414c8760e8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-kvdclt-on-pull-request-svpk8-init-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4d304ffd-99f3-4a2e-a6ff-0a160a651ee0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-ob716ca9541901cfcdfd53404b04caca8-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=63f0cfea-8aad-4fbb-932e-c4c3adc8ad8e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-build-container-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=030ca76b-aa0e-41f8-bd59-e7aaac74cb15 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-o7b6d5914f444f249b3c6409383a376ab-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6678b994-0a8b-45da-afcb-a8e1338ce92b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp6eaa4ac2854d5a468e91954f545f58df5cc93fa9386fbd5feb-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=92903cef-81dc-4df2-9e2a-282978cf8012 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:06:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g6eaa4ac2854db38076df6467b335d0db3a8cf960b9df-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b7291b28-9fff-4d6e-848c-5a8a0ce360bf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac6eaa4ac2854d5a1d5a4031981bfb23a9d30c98c53f0e39-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=93891ffc-2ba7-4afe-81fb-7b0228fb9a2d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componenfae59321369bef0634604113edad1899bc9b7bc7da9067-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2bfd3429-ec87-4ea4-9e8d-708fab70385d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen8292674c8502b4caa48a9ab8417135f974fca266644e15-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b3ccf358-deb0-455c-9f73-f3be6ec29451 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-kvdclte08a23a8e0540399dffca294a1a02296-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=79166707-be61-4267-a4d7-e84e7801eeae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-kvdclt419302625f4d53901f548d98e1cdc7e5-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=447619a0-96c8-48f8-941e-b9551b95a42b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g6eaa4ac2854ddb158b7a37a14ed633dbf85ee225ca8e-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5210661e-b3ff-42d6-8964-5702090ee230 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:08:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-kvdcltb657daf8f0f8219b5f85e7fd547bff5d-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7394fd84-cf4d-44e1-9414-3e68eb052414 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes6eaa4ac2854d5a468efd1f01295978510558b4fa34eb2afc01f999f3-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0f78b80b-cbda-44c4-b76f-794d17b1442a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-6eaa4ac2854d55eb6b86a43ce4cc117e5b7ab194dff8e-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c4c99e2e-b7c0-40a0-8182-15916f23241c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pa6eaa4ac2854d5a4d7c0ed320abddaa5cfe72db176c38fd7-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=422d485b-5e57-4af6-a0c4-c62a0eea0606 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-on-pull-request-4rk69-clair-scan-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a7081775-3891-4a3b-b4fa-3db751837faf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-gitlab-kvdclt0fb673e70e0660617b83360379fa762e-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5db9e99e-e76f-4898-8da6-bde0b68c26f1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:03Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-obbd3cd85755581d54bfffac4c836542a-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03e9fdd5-2a75-4486-b314-a461032fedb9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-pac-g6eaa4ac2854db4fb34341ce640f0cbbe8afa07d90508-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=43315a12-1248-4558-ab9e-b99d7aa540ab user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-o7552640d2a3b9dc81de70c966a476242-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8befcfe1-c184-46e7-9c80-d6780e0ca9fc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:12Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp-p6eaa4ac2854d5a46a4ef79e05c8ad573f1cd716bbd6b32af-pod namespace=gitlab-rep-klsx operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c91fb13-f156-4547-a03d-2e0bb9446aa2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-on-pull-request-4rk69-clamav-scan-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9c9d2eb9-4cc9-40d6-b5f9-1529d0e427c7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tesfae59321369befca4f3cd5191d8ad85390d3081428a213d968329f56-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0a86e2e6-5f29-4c85-9773-e4b3d4411f46 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componefae59321369befc98a2be352752dc4cf5dac04c2f0624f1-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=21ed9d56-a687-4897-b044-f633cb3c301e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componentfae59321369becba3910307fd71c2985fd0b5535ab3c3-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c034018-b504-43a8-8c26-5578821d441d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-o4ec36e37538862a835ed944199e8443f-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dec3fe91-6da5-4a2c-8245-f53ae07f7674 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-ygbrat-on-pull-request-4rk69-apply-tags-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f3cae768-3c24-4728-8b84-fab2649ae9a6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componfae59321369befca36595ae7a6c768bb72fbc879f416c129-pod namespace=integration1-ludq operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=08055bde-2f59-428c-a403-91d781bd5a00 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:21Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-build-image-index-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64fe5c1c-9f34-43b3-9d5d-82dff86d7612 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-on-pull-request-7qgs7-clair-scan-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=60c476b3-ad21-4174-907e-d3e3523d438c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-o6c3fdf4c562c54f40f2bc6309f2d4198-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fdff02e8-3c47-4d19-98de-09d225c8ba3a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:26Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-o9983122ca50297fc0f7f788b81240658-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=722c0748-03ae-4fc2-9abb-3dda2b1b4160 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes8292674c8502b4f9d0bb2708d61830bfe04d2e9bb35228b5da2fd87b-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4680671d-4b6c-4216-a0e6-179eeda4f57c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:27Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-on-pull-request-7qgs7-clamav-scan-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2fdb6996-5738-40ad-8701-3718ecc93b9b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component8292674c8502b1144407c94bd7600a2d40603fc355d68-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=75725a17-9754-4c84-b5a0-1025dd478fb4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone8292674c8502b4f955dd309111bb55cfc2a6a2d1dac1e32-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=76bf72af-85a2-47f6-92a6-afcf1acc3953 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-on-pull-request-7qgs7-apply-tags-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=87ac96e1-a842-4f15-bd95-56cd2b7c3e28 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-oaff9e0a3a5e098999aedf0f79fc17b6f-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b1998738-5e9e-432e-b8df-d1fa667a9221 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon8292674c8502b4f98460022efd5f8b5b9e699f57a36e6482-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=87e6aa88-21d1-4eda-8913-3a493d459db6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:09:42Z ERR k8s.io/client-go@v0.35.0/tools/leaderelection/leaderelection.go:445 > Failed to update lease optimistically, falling back to slow path error="etcdserver: request timed out" lock=kyverno/kyverno logger=klog 2026-02-12T14:10:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=153a8d46-9170-4842-b94d-374b56fa328c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-sast-snyk-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=57361593-6e63-43e0-bb15-c3b7e6877fb8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pullae66b5f6c00e6b9d58a115e6ea8ac5de-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=64d65aae-ce49-4e05-b441-6611c020c414 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=271a9096-da19-4e7e-90d9-5c23983b221d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-738ed1e482a8eed0e0cd93b03d539200fa021d80d391a176c54b231e-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fe1733e5-a3ea-4acf-b3b9-3b44ca7707b1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-sast-shell-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=117764d2-f5c2-44be-a092-77150d65a5eb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull2b5a8659afdda0f0735e36a11370131e-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1ad46d0c-3145-48cc-b24d-47394a29b4cf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae4d0a43-30d0-4b0f-96ac-4f0256f31c4a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-8f8jp-push-dockerfile-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=72cdc1b5-fb45-4431-b988-4df8b6a8134f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:10:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull04f369b3066603df2d0a8d479b51ca48-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cba7e646-4aa5-418f-93e9-5dd41e47a292 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:14:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-vqos-task-success-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fa4a7726-1cfa-40ec-a629-7904ecd2dc32 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:14:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-vqos-task-success-2-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=50ad48df-e49d-441f-bc7d-1d0017d6085f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:14:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=failing-build-plr-vqos-task-skipped-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d9c858ed-4587-42ca-afb7-94eee7b4078a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:14:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-pplpgh-on-push-l42gr-init-pod namespace=stat-rep-jwoe operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2907cf25-eef1-4b0e-a2da-a65bc8c6c143 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:14:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ec08c7a9-b87f-4081-bd35-8d021dce5aa1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:15:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull31a6133cbcc7fbcd21b75639846afcc0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8c2ffdf2-e1a9-411f-8a55-abae0e5cc96c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:15:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-build-container-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=dbf810a7-4544-4054-b889-63d2c94237f4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-build-image-index-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a22a624e-b112-4ed6-a507-3712793e6bcd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3df8b54c-123c-431a-93e0-cc809b9fae6c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pullc36e504aa81fe35b69927bfac686f369-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8831f689-7de8-431e-87fd-c16a5b1cee9c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-sast-snyk-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a0d30e7b-d0e4-42be-baa8-14a57072119e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c10ae82a-926e-4f7c-8424-9534ece972c0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-d55418722194246bcb92829adf511fc4647e29d16e1341beb543d993-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b714ea29-b1c3-458f-8c90-0fae313b54c6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-sast-shell-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=60adc209-d709-4bcf-8e53-ec8416403692 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pullb9c190c3edb0c5605d0a94d8b5ef5d79-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a2bc2f7d-557a-437a-a948-d57fc3760993 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b7df9206-881c-45ba-9c34-1172ab138caa user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-kcz5n-push-dockerfile-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5e17690d-75bc-445f-9047-1f92bf5e7885 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:16:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pulle4246ba60c37094dcf92bfe09f90c920-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=368e2169-7f05-4045-b3c0-91d4c22c1e40 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:19:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-zhrgf-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c00a0daa-b5fc-45b0-a0c0-91445d125354 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:19:14Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co29fb29a5edbf9b347175f504c36b37b0a8a98e8e21b4d736d0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0993ecf4-86a1-42e3-93de-b0331f157bc7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:19:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-d91d3fda0cfe4eaace94d8f7a66ff150-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69a13f0c-a89f-4596-b1b8-7676584e576a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:38Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-7f6eeba1f406798dc6e160908f2d9f8c-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9e8d83d7-1e62-4b4b-8fe5-e7cd65efa480 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-zhrgf-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5e8d5f08-3ae1-469b-80b4-b495b06c8768 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-f6c8de28c1404c59264e6b4e4cbf8310-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d90a5240-6d7c-4d06-8eb8-82180d9ccb04 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-38af3e2cea491198b34257166c2d806b-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c5e6b055-25d7-444f-8b58-d41be42eb110 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-zhrgf-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=77209a58-6ceb-4bef-9bf2-7fb8a2e945fe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt29fb29a5edbf9b3471e248827edab0370d7b88d7b89864031f300fd6-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c44f2ec0-07c2-4593-ad1f-b4211bb0a6be user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-93e09ce036098b6f2b6cdc88968cd83a-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3ba49b4d-343c-4c9b-b038-614d562c4b49 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo29fb29a5edbf9b3642ee3bbefa7a208e3599692523daa37-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ba6451dd-c322-4ee6-bc08-2a08a95666f3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-zhrgf-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e94e25c8-beeb-4861-b517-36414e66622f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-a8a6f25966427eec12266eeb7520d400-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2056c5cc-5e0b-4817-a694-33bdb4056e94 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:20:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp29fb29a5edbf9b34d1b8196ab221d9d498c5c8f179c220ce-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae445ccd-b44e-422e-adb9-03b873ed206a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:22:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cddfb879a71412dd92bef40d0faea16f37-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b6073790-1096-432d-babc-ac7b29daa0c1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:22:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e44f3fbc-331c-4d68-afa5-91c4eb9c008a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:23:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-prefetch-dependencies-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7c2fb26a-b56f-45ca-b193-8fc2941db19d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:23:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tddc5aeac93da7f359e18b2ca8e808d830090d626712dd2d3b0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c0215775-947a-4816-9203-5c073346e725 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:23:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-build-container-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=190baf2f-1665-4db9-8a8c-309f1b76854c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:23:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inddc5aeac93dafc7b2584a90f2add6d69fbb74e6e0b42-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c79b0794-882b-4818-8fd7-8157ce036fe5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:23:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/validation/validation.go:121 > validation passed URLParams= action=validate clusterroles=["cluster-admin","enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","system:basic-user","system:discovery","system:public-info-viewer","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-result-read-role"] gvk="/v1, Kind=Namespace" gvr="/v1, Resource=namespaces" kind=Namespace logger=webhooks/resource/validate name=integration2-tpuu namespace=integration2-tpuu operation=CREATE policy=deny-virtual-domain resource=integration2-tpuu/Namespace/integration2-tpuu resource.gvk="/v1, Kind=Namespace" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] uid=8ed0c4cf-a9cf-430f-bbc6-bd783bb23181 user={"extra":{"authentication.kubernetes.io/credential-id":["X509SHA256=357eb4b73f115582a49f33e5b45c74cc6ad9b905f15ce90888ec4ed914c133b7"]},"groups":["kubeadm:cluster-admins","system:authenticated"],"username":"kubernetes-admin"} v=2 2026-02-12T14:24:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-on-pull-request-8sv79-init-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ac47da1c-59f0-40e6-b1d8-99478ba3c3a0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:24:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-comp0a255b6fb28085a400c6fc957ccf322bc6c7f221ef59ad117f-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=37a451a8-53c8-4fe6-80a6-342a79825dbf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:24:42Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-o47f4294c9b858fd03514848bd656442c-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=164cc260-d5e3-46da-9000-dc6b02ad2738 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:24:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-ddc5aeac93da7fa00f1f5517f37ad5638741aa2ae063c8-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd78a9df-5a3e-4023-93f2-39801bf677f4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:24:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-build-image-index-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2c2d1f46-7f5e-4d63-bf11-eb8440b86097 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integraddc5aea80300aca4ead098fdc236af05fe65143-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=38f99201-7f89-4b8e-956d-df4c8f4e7dc6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:05Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cla62fd5d0859e4d828a229398e408f932-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=06ef440d-4be5-447f-9c6d-e1c440c57be7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inddc5aeac93da9f7f2f7aecda891c84fca67aee754d64-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d30560e5-137d-497e-befe-d5fb16f7e4b8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integrddc5aeacbe46a4ccc567588794f58abc723cc5c2-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4cceb54d-ba72-43ad-a71c-225ab12c9561 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konddc5aeac93da7f359e7987a787a99892377434950d97fd08d750fbc4-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=235edc95-3f12-4b08-ba57-bf0c8692ea28 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-iddc5aeac93da7ad7f6f5f2e9d25af95f8fe6c79e5471f-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=25a03c72-4afc-4c04-b42a-fc7e8dcd1a44 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-testddc5aeac93da7f33c6aec1427f222bbf1388246102d7fc5-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e3b48ef4-9ac3-4d34-b44f-28eb8a6aedc6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integraddc5aead4b140eab79186cf70799cea4a9f7b30-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=139874ff-97bb-42fb-9635-85590c2bea99 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-inddc5aeac93daf7e5fe4e3b558be4f65c6b681538639c-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b32cd6dd-c2a9-4802-846a-27d5dd24a46d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tesddc5aeac93da7f359b2c27959a79924caff04c8b57d0419b-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d52327ca-d3fc-4b50-928e-37dd31355e86 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:15Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5c838b7e-a3c8-44e7-b577-ca23485d9004 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-84bd1fb53bdc3d8a5e61b187779fc67a-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6216716f-c324-4341-a2a1-8b8ad95d62f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-sast-snyk-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ebd23c50-82c0-4cb0-9863-c71dbdf26b0a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c25eddda-b7d1-4fd3-8708-0c9ed1f730c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyte5ef7e50cdb3c62ca0eaf89e7d34a8355044d99f5dce0e0c1dabf1d5-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c1c6d127-29da-49ee-a25c-9fedf0b9cb02 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:17Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-sast-shell-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f87d1d64-1fc1-4be1-aaa6-7b2d44dbe408 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:18Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-sast-unicode-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=cc28019f-ab11-46a1-a19d-eb3966a9fe37 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=eefcd975-8fc0-4c61-8017-ce87335b253d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-push-dockerfile-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f9e988a-3e06-41e5-bd59-946680bc6b8b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:25:20Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-push-s447w-rpms-signature-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3429464a-cb56-4056-93b9-a1e8db6c1956 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-componen0a255b6fb280856b4c0b88bac42d805183c9b5775e4506-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b5fb7e28-59fa-4de8-b029-4cd8d02af62a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:41Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-on-pull-request-8sv79-clair-scan-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=137115e6-8497-4fa1-90a6-6ea7eb300f0f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-odc75f259446a07d6fa3e917bc1e72a8a-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1d2970b0-369d-4b5a-82e1-85d29b057ed9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-obe927439744411c4fcee7d14e839fd1b-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7216fcbc-8266-42f2-b459-2fd0c9fc9d60 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-on-pull-request-8sv79-clamav-scan-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a9031efd-c8fc-4201-bf56-4193fb1893bc user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:43Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=tes0a255b6fb28085a40010a71bb3723196a7de26986fc3368a4b0d822e-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=09d82905-bd07-4c18-8cfa-356f20987722 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component0a255b6fb2808a4fd6b8c163748bed0d6d1ff0e526440-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ee6fb939-d873-4ef5-b72c-71561949cc98 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:44Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compone0a255b6fb28085a2b932eedd59da950774f9e4bcd5d07d4-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0cc0be99-3825-46bd-8f64-d956155e882f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:45Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-on-pull-request-8sv79-apply-tags-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d5393518-977c-4aa5-a664-0ff3c87f96f0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:46Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-component-pac-winraj-ob80c667c6f21dd0de19584f340e5f421-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d0494fb0-6d04-4c84-8a52-e05cc4d9e48a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:26:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=test-compon0a255b6fb28085a4fdd842ad1d09e4ce1991c8cb3d58434a-pod namespace=integration2-tpuu operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f9f0e48d-2911-47e3-84e5-f0892d1686ef user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:27:37Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clone-baueyz-on-push-8kxq6-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=08591368-8db5-4c2d-945d-d10ed68badd6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:27:47Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=782a90f7-cc76-42b2-a281-4ebf3d350ab5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:27:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-mhrs7-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=328f601f-dee3-4999-8867-17a985fa2c1a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:27:57Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-c0813dcdae5532c6d9ae75353f7035952a-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=91ccb167-7efd-4e8e-ac73-2d9f0038bcd8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t33d24015e4cd034abe4567101da2b5559f5ac2c74d31881310-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0ca6fe1e-641a-4249-8219-34f90adffc95 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:13Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in33d24015e4cd570cba55f00ecaf5d4c8e7c68e7a7796-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=372024ce-5c10-4f31-9bdc-a8218b0943d4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull2536988147951ab8805729949e835708-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fab07f5e-df42-4e40-b8a1-29254a71492e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:19Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co06b80b7c76409e98bac6a3b3b763b2919b659e15ade35c5f13-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ea808d0f-40aa-439b-89d4-53e62a4b2699 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:22Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-t042b6b7545f23dd04347d5cdad441874e133f0d062dbd125c5-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3f50b8dc-b0c1-4f0e-8777-c62552c3f8e1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:25Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-build-container-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a81c74e-5772-4c76-9990-074168d5448a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-94709ecac09d79646b2925cf2d6081e5-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9f2e72e1-9a5b-4d34-a102-dae141c0af3e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:28:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in042b6b7545f2c1f2f49d83d5e3e730bbad94bffaeae9-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4fae2e06-c389-470d-97eb-3e808803978f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:29:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-33d24015e4cd03171f88ab441774a58ffc4b95043c49b8-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c88a0ba2-bf4c-4ed5-890e-8138e0f330a4 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-042b6b7545f23d98486469146aea3ab3e6c2d7c73e6100-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d2cf7dcf-02c8-4bd2-85bb-fd4c2c5acbba user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl9ce0b59136be676bb9e405828bea85ac-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=355fab0b-6569-4a9f-bfd1-00856c74b461 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl58b837744041658d32c2ed4e6df89a32-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e751cf78-fa8d-4651-832d-edb7f98189a3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:07Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in33d24015e4cd81265b593eafdbfe19096b986884dfe7-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=55de07b9-2876-4262-b469-358059c6e689 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:08Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl8373d7f398d9c59e834b15df139b2f50-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=54b5ea3d-87ff-4b1f-a99c-beafb61aae2b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon33d24015e4cd034abeab1c65ce124e728f0127968ed018c9aee7af30-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f093fee4-ab20-4610-92de-15fd073c9a8c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:09Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i33d24015e4cd06ca855037bb361aa88d652b2bdec5cbb-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d9cd6e94-c9fa-48ef-9955-1cbea5594547 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:10Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test33d24015e4cd034ff73ddfa995970877663f50f046f688b-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c206fc52-d92c-4292-b3c6-dcab3be82ba3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-clff93cef1fefd57a570399a8e29bdc2b0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e04ebecd-144a-4876-897f-b7a6785b9903 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in33d24015e4cdc19ec472f1da82c9614856ac908a2c42-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8593a48c-e494-41b0-b7c2-50484fe41fb5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:11Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes33d24015e4cd034a93c7efabd2eedfe1cb219973851d98b7-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=efe3cf45-c0a1-4fdb-963b-c4ac61e13736 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:16Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-f9a4d61697d4f31f2a4b4fbc55369c62-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=65d7ed14-6e65-4cb6-985b-79a2443b2a5d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:28Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra042b6b70f3796b1f7941b9190ffd3e167d4f393-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f5314c31-32b4-4534-a1d7-572ba785c7d7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in042b6b7545f2f3fc285d10f90ca9f910bcbc72bf4735-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8ad939d3-e2e7-4e09-aa0e-2fff285953b7 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:29Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integration-cl4d37ed73db38c50da5016a9feb7bc11c-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=28ca67eb-a8d2-42fc-96d5-de377fda7888 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integr042b6b75ce90ce9bfed74bc8f1fe7da7b03c7e48-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=224f982f-1fd9-4405-b32a-84f62272cb7a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=kon042b6b7545f23dd043dde73a7715d8a63281cc0e4429cd6358bf7802-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=820fa6dd-35e0-4335-815e-048d79802292 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-i042b6b7545f23334b7cf3613792caf6d05442ec7f41f4-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c08ab9d6-6049-429c-ba65-d0457d91fcf0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-integra042b6b71561fc8d3003309792032afff2461cff-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=03ea3aec-89a3-4be7-8d5d-deb03a00e3d6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test042b6b7545f23dd134603447549f68fe56f17b077faac3d-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8239c623-c123-409e-8081-95adbac790ef user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-test-in042b6b7545f2fb8ada79e2f548d48f10126c8e5226e6-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ac8f755e-e3a4-420d-b0e0-8f4489082dfe user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=konflux-tes042b6b7545f23dd0e2af529bbc151fe5c98be002484b603d-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=0742b4ba-d208-4c34-ae24-64efba665e28 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:36Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-build-image-index-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2399d54d-fe7c-4713-beb6-9d3b59d4c978 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:48Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-mhrs7-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=004bcade-a170-4cd9-b682-8976d707b9e1 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:49Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-64c19f2bdf930d4edd2577915882e7f2-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=97cbee22-2035-43b0-adaa-b20dd0862d24 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-2e8336c0c3b3f4969131ad0491ea2f05-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=26948c70-fda9-438a-a0b4-154339cfcc49 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:50Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-mhrs7-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4617a56a-762a-4ebd-874f-16e576ca4d9c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt06b80b7c76409e98ba58b34d72fb2d7e0c6d8f82b1bb151763c72735-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4f643b26-b6e4-4123-abc0-2757266b95ef user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-263e282d2ad8c93ef308be221b01da2a-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f5d0bd79-c229-474d-b38c-4bcc7a4d1a32 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo06b80b7c76409e94e2aea91f8190ad47dd204845f706087-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3dd1c888-f05d-4f36-8648-9aa2aaf59820 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-mhrs7-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=fd8f10d5-88f0-4a27-9153-932063f5486e user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-e0cb8b319c3332756fe23ffad1b8bfc0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=279475e0-9127-4fdb-b2ee-a8008257d70b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:30:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp06b80b7c76409e98100a349a3b7db8fbb8aaa6cd6f11ff0e-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=5bd71cb9-b4bf-4008-a55f-da7cc749748a user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:31:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=004dacf8-78a8-4f0a-a843-8a87b1045857 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:31:59Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull0679466bd9d73cbb35827de7fbb62c89-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=4f1a33fa-b174-4055-b9fe-befc53d91ff5 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:00Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-sast-snyk-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=b231332b-55a6-413e-a9bf-095878b74639 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9026a9f8-6eb4-4fac-9491-927652db1c1f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-8c0c94afb54ac6c803f22f9c02c08017ea9aeddb4c9bad685f09ce56-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c54daa81-dcbe-4a42-aa07-a2dd11f3d18b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:01Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-sast-shell-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9a188dc8-85d8-4acd-9beb-06737bd1d455 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull89005361661746bf76cce8c0804c22b7-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=e78c03a3-14d4-43a1-bcfe-8c89013d2229 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:02Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae7be8c2-444f-451e-a690-3114e1f03b16 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-wp42p-push-dockerfile-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=33c38085-9a20-4f98-b2e2-80f16d75097d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:32:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull7a05576d816358a62c2af40fb2dc1a69-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=9aac060c-e6bc-4ea8-a243-716540e908ae user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:34:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f8ec5bf-4b56-4f51-aae2-ac80b095ff7c user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:34:35Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-pd9wr-init-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ef09a721-3e87-4c6f-bd74-a31e6e0495c9 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:34:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull318bf9fe20574d0acd9e76279804ce9e-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=80b72468-95aa-4c8b-ab70-5b554116630d user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:34:58Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-co6bbd893f7eea20a08043a94a7f351d1d94d94064ce73a614b7-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=7f4c0255-0b55-4861-975e-79b88a1dd6c2 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:35:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-build-container-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=692c0c0b-69d0-428b-afca-d94e291d5b86 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:35:06Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-262f6c5a5e594cebf0a08abbb65b6173-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=08e73cb9-2ce7-4875-ae74-a8a0807c0019 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:40Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-3de2cb89a5ac77a830a5c8fc55d3e63d-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c3aa5387-7f0b-4767-96af-73a2298b5c30 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:51Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-pd9wr-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=78b01ba9-eac9-4c0e-8ac4-ae7b1b0c793b user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-5b7332617253608f81881214a095c7de-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8a6f3eb9-6595-4bfd-ba0a-005f3f7994b3 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:52Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-52c90d800d402aef067e3e8f9b5c1d6b-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1e996477-ee1c-4611-8564-1387381afa58 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-pd9wr-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3d6e1689-592b-4d35-a4bc-91e4a5329acd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:53Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=pyt6bbd893f7eea20a080c538817925d53146968adb51ea5452327c9cc4-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=69cd668b-e5a1-42fd-a5a7-ea1ddfb5aecb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-979164861788ed7f524ac784bbec2727-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=3ce75143-2066-4ea6-bd2f-03319692780f user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:54Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-compo6bbd893f7eea20acc602bfc1af8f8f09a4aef9256978f56-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=ae003bbc-8434-476a-8a95-e1685b70f729 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-pull-request-pd9wr-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2851efff-5254-4c52-9419-3ac4cde392ce user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:55Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-component-nycrfg-on-afbbf91647493db4ee324c3559b66c8e-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=1ce7d51c-9856-4572-a5cd-89f2363bd6b6 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:36:56Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=python-comp6bbd893f7eea20a0be957e27333885170aea5438494c71cb-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=74f09e99-83e0-4e8f-baf6-aab2b22b79fd user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:04Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-build-image-index-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=c3876be0-e9a2-4cdd-a5b0-fb9fedafc646 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:30Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-clair-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=d52ccae3-1d25-4744-b193-9f2ac9d59fcf user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pulla057a8641941ae9818f57e571e646f94-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=8aeac780-69e0-4689-b4cd-ff46c24c80fb user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:31Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-sast-snyk-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=6837e6ae-1013-4e38-9246-9cd7b0beb381 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-clamav-scan-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=726b69f6-d63c-4f00-8e59-120b89a254c8 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:32Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-3488ac3a8bf97648de2cc96bca4989b78a0732a2e1c592f69bed67b0-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=50c217ab-a261-4bf8-915e-169d81c0d241 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull2ba176dbc37a6ad3a14df487890e5b05-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=a94bfddc-b28f-4f94-8941-f9be309e1121 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-sast-shell-check-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=06bba5db-30e2-4785-b66e-b1f76b421116 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:33Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-apply-tags-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=f64893a6-96c8-4a50-a6ee-a7dfe40b6951 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pull-request-r5hp5-push-dockerfile-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=2089cea3-20f2-4cc7-9c95-c4b668d10d91 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2 2026-02-12T14:37:34Z TRC github.com/kyverno/kyverno/pkg/webhooks/resource/mutation/mutation.go:131 > mutation rules from policy applied successfully URLParams= clusterroles=["enterprisecontract-configmap-viewer-role","enterprisecontractpolicy-viewer-role","releaseserviceconfig-role","system:basic-user","system:discovery","system:public-info-viewer","system:service-account-issuer-discovery","tekton-chains-public-key-viewer","tekton-config-read-role","tekton-pipelines-controller-cluster-access","tekton-pipelines-controller-tenant-access","tekton-result-read-role"] gvk="/v1, Kind=Pod" gvr="/v1, Resource=pods" kind=Pod logger=webhooks/resource/mutate name=go-component-dicpbo-on-pullc40cfa2e9ea99dd7089674e53413df50-pod namespace=group-zgkk operation=CREATE policy=reduce-tekton-pr-taskrun-resource-requests resource.gvk="/v1, Kind=Pod" roles=["build-service:build-service-build-pipeline-config-read-only","konflux-info:konflux-public-info-view-role","pipelines-as-code:pipelines-as-code-info","tekton-operator:tekton-operator-info","tekton-pipelines:tekton-chains-info","tekton-pipelines:tekton-pipelines-controller","tekton-pipelines:tekton-pipelines-info","tekton-pipelines:tekton-pipelines-leader-election","tekton-pipelines:tekton-results-info","tekton-pipelines:tekton-triggers-info"] rules=["reduce-tekton-pr-taskrun-resource-requests"] uid=18538155-b3cf-4133-9d76-1fcf48bad0d0 user={"extra":{"authentication.kubernetes.io/credential-id":["JTI=eec0aa77-b3d9-406d-9b84-67c9095a2b6b"],"authentication.kubernetes.io/node-name":["kind-mapt-control-plane"],"authentication.kubernetes.io/node-uid":["31a8cbf4-1733-45cc-9c1b-f6638dee399a"],"authentication.kubernetes.io/pod-name":["tekton-pipelines-controller-5dfff97774-g5hpx"],"authentication.kubernetes.io/pod-uid":["debb70c0-84d7-4862-98ee-5b8debf9064f"]},"groups":["system:serviceaccounts","system:serviceaccounts:tekton-pipelines","system:authenticated"],"uid":"2f74e76d-f47e-4262-8f85-d02d1ab6d5d7","username":"system:serviceaccount:tekton-pipelines:tekton-pipelines-controller"} v=2