iiRecord
Agentic AI Atlas · Krate Policy Admission Integration
kubernetes-controller:krate-policy-admissiona5c.ai
II.
KubernetesController JSON

kubernetes-controller:krate-policy-admission

Structured · live

Krate Policy Admission Integration json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate-controllers.yamlCluster · domain
Record JSON
{
  "id": "kubernetes-controller:krate-policy-admission",
  "_kind": "KubernetesController",
  "_file": "domain/products/krate-controllers.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Krate Policy Admission Integration",
    "description": "Krate policy governance integration that binds Krate policy resources to Kyverno-backed admission and exception workflows.",
    "owningPlatformId": "platform:krate",
    "controllerKind": "admission-controller",
    "runtime": "kyverno-admission-webhook",
    "sourcePath": "packages/krate/charts/crds/policy-resources.yaml",
    "reconciliationScope": "multi-namespace"
  },
  "outgoingEdges": [
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-profile",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-template",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-binding",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-profile",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "policy-only"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-template",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "policy-only"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-binding",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "policy-only"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "policy-only"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-profile",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-template",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-binding",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    }
  ],
  "incomingEdges": []
}