II.
PlatformService JSON
Structured · liveplatform-service:krate-policy
Krate Policy Engine json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "platform-service:krate-policy",
"_kind": "PlatformService",
"_file": "domain/products/krate.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Krate Policy Engine",
"platformId": "platform:krate",
"description": "Policy enforcement services: PolicyProfile, PolicyTemplate, and\nPolicyBinding resources define org-level governance rules. Kyverno\nadmission webhooks enforce policies on resource creation/mutation.\nAgent-specific policies control tool access, secret grants, and\nworkspace boundaries.\n"
},
"outgoingEdges": [
{
"from": "platform-service:krate-policy",
"to": "platform:krate",
"kind": "part_of"
},
{
"from": "platform-service:krate-policy",
"to": "tool:kyverno",
"kind": "integrates_with",
"attributes": {}
}
],
"incomingEdges": [
{
"from": "kubernetes-crd-kind:krate-krate-workspace-policy",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "agent"
}
},
{
"from": "kubernetes-crd-kind:krate-agent-service-account",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "agent"
}
},
{
"from": "kubernetes-crd-kind:krate-agent-role-binding",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "agent"
}
},
{
"from": "kubernetes-crd-kind:krate-agent-secret-grant",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "agent"
}
},
{
"from": "kubernetes-crd-kind:krate-agent-config-grant",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "agent"
}
},
{
"from": "kubernetes-crd-kind:krate-ref-policy",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "aggregated"
}
},
{
"from": "kubernetes-crd-kind:krate-external-backend-sync-policy",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "external-backend"
}
},
{
"from": "kubernetes-crd-kind:krate-policy-profile",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "policy"
}
},
{
"from": "kubernetes-crd-kind:krate-policy-template",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "policy"
}
},
{
"from": "kubernetes-crd-kind:krate-policy-binding",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "policy"
}
},
{
"from": "kubernetes-crd-kind:krate-policy-exception-request",
"to": "platform-service:krate-policy",
"kind": "belongs_to_resource_family",
"attributes": {
"family": "policy"
}
},
{
"from": "topic:krate-crd-inventory",
"to": "platform-service:krate-policy",
"kind": "relates_to"
},
{
"from": "tool-server:krate-mcp-server",
"to": "platform-service:krate-policy",
"kind": "integrates_with",
"attributes": {}
}
]
}