II.
KubernetesController JSON
Structured · livekubernetes-controller:krate-policy-admission
Krate Policy Admission Integration json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "kubernetes-controller:krate-policy-admission",
"_kind": "KubernetesController",
"_file": "domain/products/krate-controllers.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Krate Policy Admission Integration",
"description": "Krate policy governance integration that binds Krate policy resources to Kyverno-backed admission and exception workflows.",
"owningPlatformId": "platform:krate",
"controllerKind": "admission-controller",
"runtime": "kyverno-admission-webhook",
"sourcePath": "packages/krate/charts/crds/policy-resources.yaml",
"reconciliationScope": "multi-namespace"
},
"outgoingEdges": [
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-profile",
"kind": "watches_resource",
"attributes": {
"watchType": "primary"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-template",
"kind": "watches_resource",
"attributes": {
"watchType": "primary"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-binding",
"kind": "watches_resource",
"attributes": {
"watchType": "primary"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-exception-request",
"kind": "watches_resource",
"attributes": {
"watchType": "primary"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-profile",
"kind": "reconciles_resource",
"attributes": {
"mode": "policy-only"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-template",
"kind": "reconciles_resource",
"attributes": {
"mode": "policy-only"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-binding",
"kind": "reconciles_resource",
"attributes": {
"mode": "policy-only"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-exception-request",
"kind": "reconciles_resource",
"attributes": {
"mode": "policy-only"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-profile",
"kind": "emits_resource_status",
"attributes": {
"statusPath": "status"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-template",
"kind": "emits_resource_status",
"attributes": {
"statusPath": "status"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-binding",
"kind": "emits_resource_status",
"attributes": {
"statusPath": "status"
}
},
{
"from": "kubernetes-controller:krate-policy-admission",
"to": "kubernetes-crd-kind:krate-policy-exception-request",
"kind": "emits_resource_status",
"attributes": {
"statusPath": "status"
}
}
],
"incomingEdges": []
}