
When to use
- You need separate runtime settings for dev/staging/prod.
- You want regional routing (us-east, eu-west) or data-sensitivity boundaries.
- You want distinct policy enforcement (e.g., prod is read-only, dev is open).
What it configures
- Execution settings: environment variables, secrets, and integration credentials available to all workloads in this environment.
- Context: shared knowledge bases and resource catalogs agents can reference while executing.
- OPA policies: rules that must be satisfied (time windows, RBAC, labeling, approvals).
- Skills: system-level capabilities (filesystem, shell, Docker, Python, etc.).
- Priority: scheduling weight when multiple environments are eligible.
How it works in Kubiya
- You create one or more environments (a default is provided).
- Teams/agents are deployed to one or more environments.
- When you start a task, Kubiya routes it to the selected environment.
- Policies are evaluated; if allowed, steps execute with the environment’s execution settings and Skills.
- Readiness badges (e.g., Ready, Normal) reflect health and availability for routing.
Create an environment

- Go to: Environments > Create Environment.
- General
- Environment Name (immutable key, lowercase, no spaces).
- Display Name and Description.
- Priority Level slider: higher values are processed first when routing (Low 1-3, Medium 4-5, High 6-7, Critical 8-10).
- Optional Tags for filtering.
- Execution
- Environment Variables: key/value pairs (e.g.,
API_URL). - Secrets: select stored secrets to expose at runtime.
- Integration Credentials: attach accounts/keys for external systems.
- Environment Variables: key/value pairs (e.g.,
- Context
- Knowledge Base: add documents/data sets agents may consult.
- Resources: add catalog entries (clusters, services, repos, etc.).
- Policies
- Select one or more OPA policies to enforce in this environment.
- Skills
- Add system capabilities (e.g., Shell – Safe Commands, Docker – Containers, Python).
- Create Environment.
Edit or evolve an environment
- Environments > open the card > Configuration.
- Adjust any tab (General, Execution, Context, Policies, Skills).
- Update Environment to apply changes. Updates affect subsequent runs for teams/agents deployed here.
Common patterns
- Dev / Staging / Prod: relaxed vs. strict policies; different credentials; prod marked High/Critical priority.
- Regional isolation:
prod-euvsprod-uswith region-specific credentials and resources. - Data-sensitivity tiers:
pii-restrictedwith limited Skills and stricter OPA. - Air-gapped: environment with only self-hosted workers and local Skills.
Tips
- Start with the Default environment; create additional ones as soon as you need different policies or credentials.
- Keep Execution minimal in prod—prefer read-only Skills where possible and enforce OPA policies (MFA, business hours, RBAC).
- Use Priority to ensure urgent or prod work preempts lower-priority queues when capacity is shared.
Relationships
- Projects: can provide shared goals/context; environments supply the runtime boundary.
- Teams & Agents: inherit execution settings, context, policies, and Skills from the environment(s) they’re deployed to.
- Task Workers: provide the actual compute capacity. Make sure workers are connected to the queues that service your environments.
Troubleshooting signals
- Status not Ready: missing secrets/integrations or misconfigured Skills, open the environment and review Execution and Skills.
- Tasks don’t start: no worker capacity, check Task Workers and queue attachments.
- Policy denials: open Policies on the environment and inspect OPA rule messages in run logs.
- Wrong credentials used: confirm the task ran in the intended environment and that Execution > Integration Credentials are correct.