Skip to main content
Teams coordinate multiple agents to work together with shared context, tools, guardrails, and inherited configuration from Environments. They are ideal when a function, department, or project requires a set of agents that operate within shared constraints, credentials, and policies. Below are two complete, real-world use cases demonstrating how to create, configure, and use Teams effectively.

Use Case 1: Platform Engineering Team

A Platform Engineering team owns CI/CD, environments, deployment automation, and developer workflows. They need multiple agents to collaborate across Kubernetes, GitHub, Terraform, and pipeline operations.

Purpose

  • Automate deployments across clusters
  • Validate IaC (Terraform, Helm, Argo)
  • Troubleshoot failed pipelines
  • Provide development teams with self-service infrastructure operations
  • Run tasks with consistent guardrails and credentials

Agents Included

  • Platform Engineer Agent: orchestrates deployments, runs pipeline checks
  • CloudOps Engineer Agent (optional):provides cloud-level checks and drift detection
  • SRE Helper Agent (optional): diagnostics and log extraction

Typical Workload

  • Deploy a service to staging/production
  • Validate Terraform for infrastructure changes
  • Roll back a failed deployment
  • Debug CI/CD pipelines
  • Run canary analysis using metrics platforms

How to Create This Team

Kubiya Platform Overview

1. Basic

  • Team Name: Platform Engineering
  • Description: “Deployment automation, Kubernetes operations, CI/CD tooling.”
  • Visibility: Organization (visible to dev teams but writable only by members)

2. Deployment

Kubiya Platform Overview
  • Runtime: Default (unless your org separates prod/stage runners)
  • Environments: Add
    • staging
    • production
    • sandbox (optional)
  • Environments supply Kubernetes credentials, cloud access, registry secrets, etc.
Execution Environment (per team):
  • Environment Variables:
    • DEFAULT_NAMESPACE=platform
    • DEPLOY_STRATEGY=rolling
  • Secrets (only if team-specific):
    • None, prefer using Environment-level cloud credentials
  • Integration Credentials:
    • GitHub
    • GitLab (optional)
    • Kubernetes clusters

3. Members

Kubiya Platform Overview Add agents:
  • Platform Engineer Agent
  • CloudOps Engineer Agent Optionally add human members:
  • Infra engineers (Editor)
  • DevOps/SRE (Operator)

4. Tools

Kubiya Platform Overview
  • Skills:
    • Shell – Full Access
    • Docker – Full Control
    • File operations
    • Python
  • MCP Servers:
    • “Enable Kubiya Platform APIs” (recommended)
    • Custom MCP servers for GitHub/GitLab/ArgoCD

5. Advanced

Kubiya Platform Overview
  • Team Instructions: High-level instruction for multi-agent coordination (e.g., “Plan deployments before execution, validate cluster state, escalate errors with full logs.”)
  • Team Context:
    • Deployment playbooks
    • Runbooks (rollback, canary, debugging)
  • OPA Policies:
    • Allow deploy only to approved namespaces
    • Allow Terraform actions only in staging
    • Disallow destructive Kubernetes commands in production

How the Team Behaves at Runtime

When assigned a task, the team:
  1. Uses shared credentials from the selected Environment
  2. Coordinates between Platform Engineer + CloudOps agents
  3. Applies Team-level Skills and OPA policies
  4. Executes each step in isolated containers with full logs

Example Usage Scenarios

Developer request: “Deploy service checkout to staging with version v1.12.0.” Platform engineer task: “Run Terraform plan for the new database module.” SRE diagnostic: “Show me the last 100 lines of logs from checkout service in production.”

Use Case 2: Security Operations (SecOps) Team

A Security Operations team handles incident detection, vulnerability scanning, and remediation workflows. They require agents to work with shared, tightly controlled credentials and follow strict policies.

Purpose

  • Detect anomalies in logs and metrics
  • Validate IAM permissions
  • Perform vulnerability and configuration scans
  • Automate security checks during deployments
  • Enforce strict operational guardrails

Agents Included

  • Security Analyst Agent (your SRE Helper / extended capabilities)
  • CloudOps Engineer Agent (for cloud identity + infrastructure checks)
  • Log Analyzer Agent (optional custom agent)

Typical Workload

  • Detect anomalous login patterns
  • Scan cloud accounts for misconfigurations
  • Validate security group/firewall settings
  • Check for exposed secrets in repositories
  • Run compliance checks (SOC2, CIS, ISO baselines)

How to Create This Team

1. Basic

Kubiya Platform Overview
  • Team Name: Security Operations
  • Description: “Incident response, identity validation, vulnerability scanning.”
  • Visibility: Private (recommended for SecOps)

2. Deployment

  • Runtime: Default
  • Environments:
    • production-security (restricted)
    • audit (read-only permissions)
Execution Environment: Kubiya Platform Overview
  • Environment Variables:
    • SCAN_DEPTH=deep
    • IAM_AUDIT_MODE=strict
  • Secrets:
    • Use Environment-level secrets for access keys
    • Add only team-specific tokens if unique to this team
  • Integration Credentials:
    • AWS security account
    • GCP organization policy API
    • SIEM provider (e.g., Datadog, Splunk)

3. Members

Kubiya Platform Overview Add agents:
  • Security Analyst Agent
  • CloudOps Engineer Agent
  • Log Analyzer Agent

4. Tools

Kubiya Platform Overview
  • Skills:
    • Shell – Restricted (only safe commands)
    • File – Read-only
    • Python – Safe mode
  • MCP Servers:
    • Cloud security integrations
    • SIEM log retrieval
    • IAM analysis tooling

5. Advanced

Kubiya Platform Overview
  • Team Instructions: “Agents must always validate permissions before actions. Never execute write operations without explicit confirmation. Prefer read-only tools first.”
  • Team Context:
    • Incident response runbooks
    • Company security baseline docs
    • IAM architecture diagrams
  • OPA Policies:
    • Block destructive cloud actions
    • Allow only read-only Kubernetes interactions
    • Enforce mandatory approval for write actions

Runtime Behavior

The team ensures all security workflows:
  • Use the restricted Environments with limited credentials
  • Log every step for auditability
  • Remain compliant through OPA enforcement
  • Execute tasks in isolated containers with read-only defaults

Example Usage Scenarios

Security alert triage: “Analyze IAM changes in the last 24 hours and flag unusual privilege escalations.” Vulnerability scan: “Run a configuration scan for all production VPCs.” Incident investigation: “Retrieve last 50 failed login attempts from SIEM and summarize suspicious IPs.”