Agentic policy management: Kyverno, MCP, and closed-loop multi-cluster governance¶
The Kyverno MCP and Kagent session at KubeCon EU 2026 was interesting for one reason above all others: it treated policy management as an operational workflow problem, not just a policy authoring problem.
Most teams already know how to write policies. The harder problem is running them across many clusters, proving they still work, troubleshooting interactions, and doing all of that without burning platform engineers on repetitive manual checks.
That is where the talk moved the conversation forward.
The visual map¶

The real bottleneck is operational overhead¶
The session described a familiar multi-cluster reality:
- production and non-production clusters span regions and versions
- policy state is spread across reports, logs, events, and ad hoc
kubectlsessions - proving a policy is still effective often requires manual negative testing
- troubleshooting policy interactions depends too heavily on senior-engineer memory
In other words, the policy engine is usually not the slowest part. The operator workflow is.
This is the same pattern we saw in other strong platform talks this year: the main scalability issue is often not the underlying runtime, but the human operating model wrapped around it.
What the architecture is really doing¶
The talk combined three layers.
1. Kyverno remains the enforcement and lifecycle engine¶
Kyverno is still the trusted policy foundation. That matters, because agentic automation is only useful if the underlying enforcement layer is deterministic and auditable.
The speakers positioned Kyverno as more than an admission controller. It now spans a broader policy lifecycle:
- validation
- mutation
- generation
- image verification
- reporting
- exemptions
- cleanup and deletion workflows
That is an important framing shift. Governance is not just block-or-allow anymore. It is a full operational loop.
2. MCP and Kagent provide the action layer¶
The second layer is an agentic control surface that can translate a request like:
- show me the latest policy violations on production clusters
- install the relevant policies and give me the report
- audit this cluster against Pod Security Standards
into actual cluster operations.
The point is not chat for its own sake. The point is compressing scattered, specialist operational steps into bounded workflows that can be run consistently.
3. Skills package institutional knowledge¶
The strongest idea in the session was the use of reusable policy skills.
This is how teams stop operational knowledge from being trapped in:
- a senior engineer's head
- old Slack threads
- half-remembered runbooks
- ten different docs pages
A skill becomes a reusable unit of governance behavior. It knows how to install Kyverno, run an audit, collect reports, or troubleshoot a class of problem. That is more valuable than a generic assistant because it turns policy operations into shareable platform capability.
Why this matters beyond Kyverno¶
This talk was nominally about Kyverno, MCP, and Kagent, but the pattern is bigger than the toolchain.
Platform teams increasingly need closed-loop operations:
- detect state
- compare it to intent
- take bounded action
- report what changed
- preserve auditability and approvals
That is the real architecture pattern here.
If you strip away the project names, the session was really about converting governance from manual inspection into productized operational flow.
The security warning was the right one¶
The speakers were careful not to oversell autonomy.
An agent that can act across clusters is not just another dashboard. It is a privileged operator. That means the security model has to be stronger, not weaker.
The talk highlighted the right controls:
- isolation between execution contexts
- strong identity and approval boundaries
- network lockdown
- trusted skill sources and supply chain controls
- human approval for sensitive remote actions
- comprehensive logging and audit trails
This is the same lesson showing up across the better AI-platform discussions at KubeCon: governed automation wins, not unconstrained automation.
What platform teams should do with this now¶
If you manage policy across multiple clusters, there are four practical takeaways.
1. Measure operator effort, not just policy coverage¶
It is easy to count the number of policies. It is harder, and more important, to measure how much manual work is required to validate and operate them.
2. Turn repeated governance tasks into reusable workflows¶
If your team keeps repeating the same checks, audits, and remediation steps, those are candidates for skills, automation, or both.
3. Keep enforcement deterministic, make operations smarter¶
The right split is simple:
- deterministic policy engine underneath
- bounded intelligent orchestration above it
Do not reverse that order.
4. Treat agentic governance as privileged infrastructure¶
If an agent can read state, change policy, install tooling, or act across clusters, it belongs inside the same trust and audit model as other high-privilege operational systems.
The broader KubeCon pattern¶
This session fit neatly into the wider event theme.
The strongest KubeCon talks this year were all about reducing platform friction without giving up control:
- Backstage becoming a multi-surface operating layer
- TAG DevEx focusing on measurable, scoped friction reduction
- self-service environment platforms killing ticket queues with policy guardrails
- Kyverno and Kagent moving governance toward closed-loop execution
That is the pattern worth paying attention to. Platform engineering is becoming less about exposing raw infrastructure and more about packaging safe operational behavior.