Agentic AI Atlasby a5c.ai
OverviewWikiGraphFor AgentsEdgesSearchWorkspace
/
GitHubDocsDiscord
iiRecord
Agentic AI Atlas · Krate PolicyExceptionRequest
kubernetes-crd-kind:krate-policy-exception-requesta5c.ai
Search record views/
Record · tabs

Available views

II.Record viewspp. 1 - 1
overviewjsongraph
II.
KubernetesCrdKind JSON

kubernetes-crd-kind:krate-policy-exception-request

Structured · live

Krate PolicyExceptionRequest json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate-crd-kinds.yamlCluster · domain
Record JSON
{
  "id": "kubernetes-crd-kind:krate-policy-exception-request",
  "_kind": "KubernetesCrdKind",
  "_file": "domain/products/krate-crd-kinds.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Krate PolicyExceptionRequest",
    "description": "PolicyExceptionRequest records a requested exception to policy enforcement so Krate can preserve auditability and bounded approval. It is owned by the policy service and participates in admission, approval, or governance evidence. Atlas models it as a policy CRD with Namespaced scope, v1alpha1 storage version, and source-backed Kubernetes API metadata so controller, policy, UI/API, and provider edges can target the exact resource kind.",
    "apiGroup": "krate.a5c.ai",
    "version": "v1alpha1",
    "servedVersions": [
      "v1alpha1"
    ],
    "storageVersion": "v1alpha1",
    "kind": "PolicyExceptionRequest",
    "plural": "policyexceptionrequests",
    "singular": "policyexceptionrequest",
    "scope": "Namespaced",
    "sourceFile": "packages/krate/charts/crds/policy-resources.yaml",
    "schemaPath": "spec.versions[name=v1alpha1].schema.openAPIV3Schema",
    "family": "policy",
    "owningPlatformId": "platform:krate",
    "platformServiceIds": [
      "platform-service:krate-policy"
    ],
    "hasStatus": true,
    "hasConditions": false,
    "statusFieldPath": "status"
  },
  "outgoingEdges": [
    {
      "from": "kubernetes-crd-kind:krate-policy-exception-request",
      "to": "evidence:krate-crd-source-policy-resources",
      "kind": "defined_by_crd_source",
      "attributes": {
        "locator": "policy-resources.yaml:PolicyExceptionRequest"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-exception-request",
      "to": "topic:krate-crd-inventory",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-exception-request",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    }
  ],
  "incomingEdges": [
    {
      "from": "presentation:krate-web-ui",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "surfaces_resource",
      "attributes": {
        "surface": "web"
      }
    },
    {
      "from": "presentation:krate-cli",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "surfaces_resource",
      "attributes": {
        "surface": "kubectl"
      }
    },
    {
      "from": "presentation:krate-api",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "surfaces_resource",
      "attributes": {
        "surface": "api"
      }
    },
    {
      "from": "kubernetes-controller:krate-core-controller",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-core-controller",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "full"
      }
    },
    {
      "from": "kubernetes-controller:krate-core-controller",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "watches_resource",
      "attributes": {
        "watchType": "primary"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "reconciles_resource",
      "attributes": {
        "mode": "policy-only"
      }
    },
    {
      "from": "kubernetes-controller:krate-policy-admission",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "emits_resource_status",
      "attributes": {
        "statusPath": "status"
      }
    },
    {
      "from": "agent-governance-impl:krate-policy-resources@current",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "governs_resource",
      "attributes": {
        "governanceMode": "admission"
      }
    },
    {
      "from": "tool-server:krate-api",
      "to": "kubernetes-crd-kind:krate-policy-exception-request",
      "kind": "serves_kubernetes_resource",
      "attributes": {
        "serviceMode": "aggregated-api"
      }
    }
  ]
}

Shortcuts

Back to overview
Open graph tab