title | toc | weight | indent |
---|---|---|---|
Install & Configure |
true |
2 |
true |
Users looking to use Crossplane for the first time have two options available to them today. The first way is to use a hosted Crossplane service like Upbound Cloud. Alternatively, users looking for some more flexibility can install Crossplane into their own Kubernetes cluster.
Crossplane will be installed using the regularly published Helm chart. The Helm chart contains all the custom resources and controllers needed to deploy and configure Crossplane.
Users choosing the self-hosted option can reference our Install and Configure docs for installing alternate versions and more detailed instructions.
Upbound Cloud is a managed service of Crossplane created by the founders of Crossplane. You can create an account to get started. Once logged in, you can create and then connect to your hosted Crossplane cluster.
Once you've completed these two steps, skip down to Install Crossplane CLI for further setup instructions.
Want see another hosted Crossplane service listed? Please reach out on Slack and our community will highlight it here!
Installing Crossplane into an existing Kubernetes cluster will require a bit more setup, but can provide more flexibility for users who need it.
brew upgrade
brew install kind
brew install kubectl
brew install helm
kind create cluster --image kindest/node:v1.16.15 --wait 5m
-
Helm, minimum version
v3.0.0+
.
-
Helm, minimum version
v3.0.0+
.
kubectl create namespace crossplane-system
helm repo add crossplane-stable https://charts.crossplane.io/stable
helm repo update
helm install crossplane --namespace crossplane-system crossplane-stable/crossplane
kubectl create namespace crossplane-system
helm repo add crossplane-master https://charts.crossplane.io/master/
helm repo update
helm search repo crossplane-master --devel
helm install crossplane --namespace crossplane-system crossplane-master/crossplane \
--devel --version <version>
For example:
helm install crossplane --namespace crossplane-system crossplane-master/crossplane \
--version 0.11.0-rc.100.gbc5d311 --devel
helm list -n crossplane-system
kubectl get all -n crossplane-system
The Crossplane CLI extends kubectl
with functionality to build, push, and
install Crossplane packages:
curl -sL https://raw.githubusercontent.com/crossplane/crossplane/master/install.sh | sh
curl -sL https://raw.githubusercontent.com/crossplane/crossplane/master/install.sh | CHANNEL=master sh
You may also specify VERSION
for download if you would like to select a
specific version from the given release channel. If a version is not specified
the latest version from the release channel will be used.
curl -sL https://raw.githubusercontent.com/crossplane/crossplane/master/install.sh | CHANNEL=master VERSION=v1.0.0-rc.0.130.g94f34fd3 sh
Crossplane goes beyond simply modelling infrastructure primitives as custom resources - it enables you to define new custom resources with schemas of your choosing. We call these "composite resources" (XRs). Composite resources compose managed resources -- Kubernetes custom resources that offer a high fidelity representation of an infrastructure primitive, like an SQL instance or a firewall rule.
We use two special Crossplane resources to define and configure these new custom resources:
- A
CompositeResourceDefinition
(XRD) defines a new kind of composite resource, including its schema. An XRD may optionally offer a claim (XRC). - A
Composition
specifies which resources a composite resource will be composed of, and how they should be configured. You can create multipleComposition
options for each composite resource.
XRDs and Compositions may be packaged and installed as a configuration. A
configuration is a package of composition configuration that can easily be
installed to Crossplane by creating a declarative Configuration
resource, or
by using kubectl crossplane install configuration
.
In the examples below we will install a configuration that defines a new
CompositePostgreSQLInstance
XR and PostgreSQLInstance
XRC that takes a
single storageGB
parameter, and creates a connection Secret
with keys for
username
, password
, and endpoint
. A Configuration
exists for each
provider that can satisfy a PostgreSQLInstance
. Let's get started!
If you prefer to see the contents of this configuration package and how it is constructed prior to install, skip ahead to the create a configuration section.
kubectl crossplane install configuration registry.upbound.io/xp/getting-started-with-aws:latest
Wait until all packages become healthy:
watch kubectl get pkg
Using an AWS account with permissions to manage RDS databases:
AWS_PROFILE=default && echo -e "[default]\naws_access_key_id = $(aws configure get aws_access_key_id --profile $AWS_PROFILE)\naws_secret_access_key = $(aws configure get aws_secret_access_key --profile $AWS_PROFILE)" > creds.conf
kubectl create secret generic aws-creds -n crossplane-system --from-file=creds=./creds.conf
We will create the following ProviderConfig
object to configure credentials
for AWS Provider:
apiVersion: aws.crossplane.io/v1beta1
kind: ProviderConfig
metadata:
name: default
spec:
credentials:
source: Secret
secretRef:
namespace: crossplane-system
name: aws-creds
key: creds
kubectl apply -f https://raw.githubusercontent.com/crossplane/crossplane/master/docs/snippets/configure/aws/providerconfig.yaml
If you prefer to see the contents of this configuration package and how it is constructed prior to install, skip ahead to the create a configuration section.
kubectl crossplane install configuration registry.upbound.io/xp/getting-started-with-aws-with-vpc:latest
Wait until all packages become healthy:
watch kubectl get pkg
Using an AWS account with permissions to manage RDS databases:
AWS_PROFILE=default && echo -e "[default]\naws_access_key_id = $(aws configure get aws_access_key_id --profile $AWS_PROFILE)\naws_secret_access_key = $(aws configure get aws_secret_access_key --profile $AWS_PROFILE)" > creds.conf
kubectl create secret generic aws-creds -n crossplane-system --from-file=creds=./creds.conf
We will create the following ProviderConfig
object to configure credentials
for AWS Provider:
apiVersion: aws.crossplane.io/v1beta1
kind: ProviderConfig
metadata:
name: default
spec:
credentials:
source: Secret
secretRef:
namespace: crossplane-system
name: aws-creds
key: creds
kubectl apply -f https://raw.githubusercontent.com/crossplane/crossplane/master/docs/snippets/configure/aws/providerconfig.yaml
If you prefer to see the contents of this configuration package and how it is constructed prior to install, skip ahead to the create a configuration section.
kubectl crossplane install configuration registry.upbound.io/xp/getting-started-with-gcp:latest
Wait until all packages become healthy:
watch kubectl get pkg
# replace this with your own gcp project id and the name of the service account
# that will be created.
PROJECT_ID=my-project
NEW_SA_NAME=test-service-account-name
# create service account
SA="${NEW_SA_NAME}@${PROJECT_ID}.iam.gserviceaccount.com"
gcloud iam service-accounts create $NEW_SA_NAME --project $PROJECT_ID
# enable cloud API
SERVICE="sqladmin.googleapis.com"
gcloud services enable $SERVICE --project $PROJECT_ID
# grant access to cloud API
ROLE="roles/cloudsql.admin"
gcloud projects add-iam-policy-binding --role="$ROLE" $PROJECT_ID --member "serviceAccount:$SA"
# create service account keyfile
gcloud iam service-accounts keys create creds.json --project $PROJECT_ID --iam-account $SA
kubectl create secret generic gcp-creds -n crossplane-system --from-file=creds=./creds.json
We will create the following ProviderConfig
object to configure credentials
for GCP Provider:
# replace this with your own gcp project id
PROJECT_ID=my-project
echo "apiVersion: gcp.crossplane.io/v1beta1
kind: ProviderConfig
metadata:
name: default
spec:
projectID: ${PROJECT_ID}
credentials:
source: Secret
secretRef:
namespace: crossplane-system
name: gcp-creds
key: creds" | kubectl apply -f -
If you prefer to see the contents of this configuration package and how it is constructed prior to install, skip ahead to the create a configuration section.
kubectl crossplane install configuration registry.upbound.io/xp/getting-started-with-azure:latest
Wait until all packages become healthy:
watch kubectl get pkg
# create service principal with Owner role
az ad sp create-for-rbac --sdk-auth --role Owner > "creds.json"
# we need to get the clientId from the json file to add Azure Active Directory
# permissions.
if which jq > /dev/null 2>&1; then
AZURE_CLIENT_ID=$(jq -r ".clientId" < "./creds.json")
else
AZURE_CLIENT_ID=$(cat creds.json | grep clientId | cut -c 16-51)
fi
RW_ALL_APPS=1cda74f2-2616-4834-b122-5cb1b07f8a59
RW_DIR_DATA=78c8a3c8-a07e-4b9e-af1b-b5ccab50a175
AAD_GRAPH_API=00000002-0000-0000-c000-000000000000
az ad app permission add --id "${AZURE_CLIENT_ID}" --api ${AAD_GRAPH_API} --api-permissions ${RW_ALL_APPS}=Role ${RW_DIR_DATA}=Role
az ad app permission grant --id "${AZURE_CLIENT_ID}" --api ${AAD_GRAPH_API} --expires never > /dev/null
az ad app permission admin-consent --id "${AZURE_CLIENT_ID}"
kubectl create secret generic azure-creds -n crossplane-system --from-file=creds=./creds.json
We will create the following ProviderConfig
object to configure credentials
for Azure Provider:
apiVersion: azure.crossplane.io/v1beta1
kind: ProviderConfig
metadata:
name: default
spec:
credentials:
source: Secret
secretRef:
namespace: crossplane-system
name: azure-creds
key: creds
kubectl apply -f https://raw.githubusercontent.com/crossplane/crossplane/master/docs/snippets/configure/azure/providerconfig.yaml
Now that you have configured Crossplane with support for PostgreSQLInstance
,
you can provision infrastructure.
See Install and Configure docs for installing alternate versions and more detailed instructions.
See Uninstall docs for cleaning up resources, packages, and Crossplane itself.