All commands use your current kubeconfig
context and configuration.
Getting started with Crossplane provider on Scaleway Kubernetes
- crossplane
- kubernetes
Created by Upbound, Crossplane is a Kubernetes-based platform that allows you to manage resources through a unified control plane. crossplane-provider-scaleway
is a Crossplane provider that helps you manage Scaleway cloud resources in Kubernetes. It is built using Upjet code generation tools and it exposes managed resources for Scaleway that adhere to Crossplane’s eXtensible Resource Model (XRM). As a model, XRM ensures that users can easily and consistently manage cloud resources across different cloud providers.
In this tutorial, you will learn how to install Upbound Universal Crossplane (UXP) into your Kubernetes cluster, configure the provider to authenticate with Scaleway, and create a Scaleway Kubernetes managed resource directly from your cluster.
Before you start
To complete the actions presented below, you must have:
- A Scaleway account logged into the console
- Owner status or IAM permissions allowing you to perform actions in the intended Organization
- A valid API key
- A Kubernetes cluster and downloaded its Kubeconfig file
- Installed curl
- Installed kubectl on your local computer
Installing the Up command-line
Run the following command to download and install the Upbound up
command-line interface:
curl -sL "https://cli.upbound.io" | shsudo mv up /usr/local/bin/
This tutorial uses curl
but other command-line tools are available. You can refer to the official Upbound documentation for more information.
Installing Upbound Universal Crossplane
Run the following up uxp install
command to install the latest stable version of Upbound Universal Crossplane (UXP). Ensure you have version 1.12.0
or higher:
up uxp install
You should see an output like the following:
UXP 1.18.0-up.1 installed
Installing the provider into your Kubernetes cluster
-
Run the following command to create a
.kube
directory in which you will store yourkubeconfig
file:mkdir .kube -
Run the following command to open the
config
file in your.kube
directory. The file should be empty.nano .kube/config -
Paste the content of your Kubeconfig file and save the changes by following the information displayed on your terminal. Here is an example on a Mac terminal screen.
-
Run the following command to install the provider into the Kubernetes cluster using the previously set Kubernetes configuration file.
cat <<EOF | kubectl apply -f -apiVersion: pkg.crossplane.io/v1kind: Providermetadata:name: provider-scalewayspec:package: xpkg.upbound.io/scaleway/provider-scaleway:v0.2.0EOFYou should get an output similar to the following:
provider.pkg.crossplane.io/provider-scaleway Created -
Run the following command to verify whether the provider has been properly installed.
kubectl get providersYou should get an output similar to the following, with the value for
installed
returningTrue
:NAME INSTALLED HEALTHY PACKAGE AGEprovider-scaleway True True xpkg.upbound.io/scaleway/provider-scaleway:v0..0 11sNoteThe procedure may take up to 5 minutes for
HEALTHY
to reportTrue
.TipIf the
INSTALLED
field is empty, it means the process of downloading and installing the provider has failed. Runkubectl describe providers
to get more information.
Creating a Kubernetes secret resource for Scaleway
The provider requires credentials to create and manage Scaleway resources.
-
Run the following command to create a
crossplane-system
namespace:kubectl create namespace crossplane-system --dry-run=client -o yaml | kubectl apply -f -You should get an output similar to the following:
namespace/crossplane-system created -
Run the following command to create a
secret.yaml
file in which your Kubernetes secret configuration will be stored:nano secret.yaml -
Edit the request payload you will use in the
secret.yaml
file, to create your Kubernetes secret. Replace the parameters in the following example using the information in the configuration reference table:apiVersion: v1kind: Secretmetadata:name: name-of-secretnamespace: crossplane-systemtype: OpaquestringData:credentials: |{"access_key": "SCWXXXXXXXXXXXXXXXXX","secret_key": "11111111-1111-1111-1111-111111111111","project_id": "11111111-1111-1111-1111-111111111111","region": "fr-par","zone": "fr-par-1"}ImportantSecret names must be a valid DNS subdomain, meaning they must consist of lowercase alphanumeric characters, hyphens (”-”) or periods and must start and end with an alphanumeric character. Underscores (”_”) are not permitted.
-
Paste the content of the request payload into the contents of the
secret.yaml
file, and save the changes by following the information displayed on your terminal. -
Run the following command to create the secret you just defined in the
secret.yaml
file.kubectl apply -f secret.yamlYou should get an output similar to the following:
secret/name-of-secret created -
Run the following command to retrieve details about your secret:
kubectl describe secret -n crossplane-systemNoteAs the information is considered sensitive, the actual secret data will not be returned.
Configuration reference table - secret resource
Parameter | Description |
---|---|
name | The name of the Kubernetes secret object. |
namespace | The Kubernetes namespace the secret is in. |
access_key | The first part of your API key. It is like a unique ID or username and not a sensitive piece of information. |
secret_key | The second part of your API key. It is a unique ID or password and thus a sensitive piece of information to authenticate your access key. |
project_id | ID of the Project that will be used as the default value for project-scoped resources. To find your Project ID, you can consult the Scaleway console |
region | The region that will be used for all resources (by default, fr-par ). |
zone | The Availability Zone that will be used for all resources (by default, fr-par-1 ). |
Creating a providerconfig file
Create a .yaml
configuration file to attach your Scaleway credentials to the previously installed provider.
-
Run the following command to create a
providerconfig
file:nano providerconfig -
Edit the request payload you will use to create your
providerconfig
file. Replace the parameters in the following example using the information in the configuration reference table:apiVersion: scaleway.upbound.io/v1beta1kind: ProviderConfigmetadata:name: defaultspec:credentials:source: SecretsecretRef:name: name-of-secretnamespace: crossplane-systemkey: credentials -
Paste the content of the request payload into the
providerconfig
file, and save the changes by following the information displayed on your terminal. -
Run the following command to apply the previously set configuration to the secret. Make sure to replace the example file path with your own.
kubectl apply -f /users/FileName/providerconfigYou should get an output similar to the following:
providerconfig.scaleway.upbound.io/default created -
Run the following command to verify whether contents of the file have been applied to the Kubernetes cluster.
kubectl describe providerconfigsYou should get an output similar to the following:
Name: defaultNamespace:Labels: <none>Annotations: <none>API Version: scaleway.upbound.io/v1beta1Kind: ProviderConfigMetadata:Creation Timestamp: 2023-05-04T12:16:18ZFinalizers:in-use.crossplane.ioGeneration: 1Managed Fields:API Version: scaleway.upbound.io/v1beta1Fields Type: FieldsV1fieldsV1:f:metadata:f:annotations:.:f:kubectl.kubernetes.io/last-applied-configuration:f:spec:.:f:credentials:.:f:secretRef:.:f:key:f:name:f:namespace:f:source:Manager: kubectl-client-side-applyOperation: UpdateTime: 2023-05-04T12:16:18ZAPI Version: scaleway.upbound.io/v1beta1Fields Type: FieldsV1fieldsV1:f:metadata:f:finalizers:.:v:"in-use.crossplane.io":Manager: providerOperation: UpdateTime: 2023-05-04T12:16:18ZAPI Version: scaleway.upbound.io/v1beta1Fields Type: FieldsV1fieldsV1:f:status:Manager: providerOperation: UpdateSubresource: statusTime: 2023-05-04T12:16:18ZResource Version: 5471213446UID: 46460c35-b937-4459-8972-9fba7e211348Spec:Credentials:Secret Ref:Key: credentialsName: name-of-secretNamespace: crossplane-systemSource: SecretStatus:Events: <none>
Configuration reference table - providerconfig
Parameter | Description |
---|---|
namespace | The Kubernetes namespace the secret is in. |
name | The name of the Kubernetes secret object. |
Creating a managed resource
-
Run the following command to create a Scaleway Object Storage bucket:
nano bucket.yaml -
Paste the following example and save the changes by following the information displayed on your terminal:
apiVersion: object.scaleway.upbound.io/v1alpha1kind: Bucketmetadata:name: object-bucketspec:forProvider:name: crossplane-object-bucketproviderConfigRef:name: default -
Run the following command to apply the previously set configuration to the bucket. Make sure to replace the example file path with your own.
kubectl apply -f bucket.yamlYou should get an output similar to the following:
bucket.object.scaleway.upbound.io/object-bucket created -
Run the following command to retrieve details on your newly created bucket:
kubectl get bucketsAn output similar to the following should display, with the values for
READY
andSYNCED
returningTrue
:NAME READY SYNCED EXTERNAL-NAME AGEobject-bucket True True fr-par/crossplane-object-bucket 9s
Deleting a managed resource
-
Run the following command to delete the bucket you just created:
kubectl delete -f bucket.yamlYou should get an output similar to this, confirming the bucket deletion:
bucket.object.scaleway.upbound.io "object-bucket" deleted -
Run the following command to verify whether the bucket was properly deleted:
kubectl get bucketsYou should get an output similar to the following:
No resources found
Helpful developing commands
If you have cloned the Crossplane provider GitHub repository and wish to explore it, here are other helpful Upbound developing commands:
go run cmd/generator/main.go "$PWD"
to run a code-generation pipelinemake run
to run against a Kubernetes clustermake all
to build, push, and installmake build
to build binary
Reporting a bug
You can open an issue to file bugs, suggest improvements, or request new features.