docs(guides): add crossplane with workload-identity guide#1047
docs(guides): add crossplane with workload-identity guide#1047jbw976 merged 3 commits intocrossplane:masterfrom
Conversation
Signed-off-by: Christopher Haar <christopher.haar@upbound.io>
✅ Deploy Preview for crossplane ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
jbw976
left a comment
There was a problem hiding this comment.
oh fun, lots of Vale errors to fix here too 😇
https://github.com/crossplane/docs/actions/runs/21406771389/job/61632748813?pr=1047
my agent was able to do pretty well at tackling these last time i had a bunch, it just needs to know how to run Vale locally so it can check if it's doing well, e.g.:
❯ vale --config="./utils/vale/.vale.ini" content/master/
jbw976
left a comment
There was a problem hiding this comment.
Thanks @haarchri, this will be a very useful foundation to help guide people to set up this not too uncommon scenario for themselves - it will be appreciated.
This material looks reasonable enough with the caveat that I don't know this subject domain very well personally and I definitely didn't try out these instructions myself either.
Let's clean up the vale issues and copy to master and it should be good enough for me.
…sions of docs Signed-off-by: Christopher Haar <christopher.haar@upbound.io>
Signed-off-by: Christopher Haar <christopher.haar@upbound.io>

This PR adds docs for configuring Crossplane to pull packages from private cloud provider container registries using Kubernetes Workload Identity.
Users frequently encounter issues when trying to use Crossplane with private container registries in managed Kubernetes environments like EKS, AKS, and GKE. While Crossplane already supports workload identity authentication, the setup process and prerequisites are not well documented. This leads to confusion and issue requests, as seen in crossplane/crossplane#6137.
The guide provides step-by-step instructions for configuring workload identity with Crossplane across AWS EKS with IAM Roles for Service Accounts and ECR, Azure AKS with Azure Workload Identity and ACR, and Google Cloud GKE with GKE Workload Identity and Artifact Registry.
This guide helps users leverage Crossplane's existing workload identity support without requiring static credentials or imagePullSecrets.