iiRecord
Agentic AI Atlas · Krate Policy Engine
platform-service:krate-policya5c.ai
II.
PlatformService JSON

platform-service:krate-policy

Structured · live

Krate Policy Engine json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/products/krate.yamlCluster · domain
Record JSON
{
  "id": "platform-service:krate-policy",
  "_kind": "PlatformService",
  "_file": "domain/products/krate.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Krate Policy Engine",
    "platformId": "platform:krate",
    "description": "Policy enforcement services: PolicyProfile, PolicyTemplate, and\nPolicyBinding resources define org-level governance rules. Kyverno\nadmission webhooks enforce policies on resource creation/mutation.\nAgent-specific policies control tool access, secret grants, and\nworkspace boundaries.\n"
  },
  "outgoingEdges": [
    {
      "from": "platform-service:krate-policy",
      "to": "platform:krate",
      "kind": "part_of"
    },
    {
      "from": "platform-service:krate-policy",
      "to": "tool:kyverno",
      "kind": "integrates_with",
      "attributes": {}
    }
  ],
  "incomingEdges": [
    {
      "from": "kubernetes-crd-kind:krate-krate-workspace-policy",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "agent"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-agent-service-account",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "agent"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-agent-role-binding",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "agent"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-agent-secret-grant",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "agent"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-agent-config-grant",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "agent"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-ref-policy",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "aggregated"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-external-backend-sync-policy",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "external-backend"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-profile",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-template",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-binding",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    },
    {
      "from": "kubernetes-crd-kind:krate-policy-exception-request",
      "to": "platform-service:krate-policy",
      "kind": "belongs_to_resource_family",
      "attributes": {
        "family": "policy"
      }
    },
    {
      "from": "topic:krate-crd-inventory",
      "to": "platform-service:krate-policy",
      "kind": "relates_to"
    },
    {
      "from": "tool-server:krate-mcp-server",
      "to": "platform-service:krate-policy",
      "kind": "integrates_with",
      "attributes": {}
    }
  ]
}