title | weight |
---|---|
Configuration |
2 |
Install the FlexibleEngine provider with the following configuration file
apiVersion: pkg.crossplane.io/v1
kind: Provider
metadata:
name: provider-flexibleengine
spec:
package: xpkg.upbound.io/frangipaneteam/provider-flexibleengine:<version>
Define the provider version with spec.package
.
Install the provider with kubectl apply -f
.
Verify the configuration with kubectl get providers
.
$ kubectl get providers
NAME INSTALLED HEALTHY PACKAGE AGE
provider-flexibleengine True True xpkg.upbound.io/frangipaneteam/provider-flexibleengine:v0.1.2 62s
View the Crossplane Provider CRD definition to view all available Provider
options.
The FlexibleEngine provider requires credentials for authentication to Flexible Engine. This can be done in one of the following ways:
- Authenticating using AK/SK
Create a JSON file containing the Flexible Engine account credentials (AK/SK).
Here is an example key file:
{
"access_key": "your access key",
"secret_key": "your secret key"
}
Use the JSON file to generate a Kubernetes secret.
kubectl -n upbound-system create secret generic fe-creds --from-file=credentials=./<JSON file name>
Apply the secret in a ProviderConfig
Kubernetes configuration file.
apiVersion: flexibleengine.upbound.io/v1beta1
kind: ProviderConfig
metadata:
name: default
spec:
region: eu-west-0
domainName: <DOMAIN_NAME>
credentials:
source: Secret
secretRef:
name: fe-creds
namespace: upbound-system
key: credentials
Note: the spec.credentials.secretRef.name
must match the name
in the kubectl create secret generic <name>
command.
The possible keys for the spec
are:
Key | Type | Required | Default |
---|---|---|---|
domainName | string | One of domainName or domainId | |
domainId | string | One of domainName or domainId | |
region | string | true | |
tenantName | string | false | |
tenantId | string | false | |
insecure | boolean | false | false |
credentials | struct | true |