+
+## Frequently asked questions
+
+
+Can I package any software or are there any prerequisites to be a Controller?
+
+We define a *Controller* as a software that has at least one Custom Resource Definition (CRD) and a Kubernetes controller for that CRD. This is the minimum requirement to be a *Controller*. We have some checks to enforce this at packaging time.
+
+
+
+
+How can I package my software as a Controller?
+
+Currently, we support Helm charts as the underlying package format for *Controllers*. As long as you have a Helm chart, you can package it as a *Controller*.
+
+If you don't have a Helm chart, you can't deploy the software. We only support Helm charts as the underlying package format for *Controllers*. We may extend this to support other packaging formats like Kustomize in the future.
+
+
+
+
+Can I package Crossplane XRDs/Compositions as a Helm chart to deploy as a Controller?
+
+This is not recommended. For packaging Crossplane XRDs/ and Compositions, we recommend using the `Configuration` package format. A helm chart only with Crossplane XRDs/Compositions does not qualify as a *Controller*.
+
+
+
+
+How can I override the Helm values when deploying a Controller?
+
+Overriding the Helm values is possible at two levels:
+- During packaging time, in the package manifest file.
+- At runtime, using a `ControllerRuntimeConfig` resource (similar to Crossplane `DeploymentRuntimeConfig`).
+
+Create a `ControllerRuntimeConfig` with your Helm value overrides under
+`spec.helm.values`, then reference it from the Controller via
+`spec.runtimeConfigRef.name`. If you omit `runtimeConfigRef`, the Controller uses
+the config named `default`.
+
+Example of overriding replica count and image for a Controller at runtime:
+
+```yaml
+apiVersion: pkg.upbound.io/v1alpha1
+kind: ControllerRuntimeConfig
+metadata:
+ name: example-controllerruntimeconfig
+spec:
+ helm:
+ values:
+ replicaCount: 2
+ image:
+ tag: "v1.2.3"
+ # Add any other Helm chart values your controller chart supports
+---
+apiVersion: pkg.upbound.io/v1alpha1
+kind: Controller
+metadata:
+ name: my-controller
+spec:
+ package: xpkg.upbound.io/your-org/your-controller:v1.0.0
+ runtimeConfigRef:
+ name: example-controllerruntimeconfig
+```
+
+
+
+
+How can I configure the helm release name and namespace for the controller?
+
+Right now, it is not possible to configure this at runtime. The package author configures release name and namespace during packaging, so it is hardcoded inside the package. Unlike a regular application that is deployed by a Helm chart, *Controllers* can only be deployed once in a given control plane, so, we hope it should be ok to rely on predefined release names and namespaces. We may consider exposing these in `ControllerRuntimeConfig` later, but, we would like to keep it opinionated unless there are strong reasons to do so.
+
+
+
+
+Can I deploy more than one instance of a Controller package?
+
+No, this is not possible. Remember, a *Controller* package introduces CRDs which are cluster-scoped objects. Just like one cannot deploy more than one instance of the same Crossplane Provider package today, it is not possible to deploy more than one instance of a *Controller*.
+
+
+
+
+Do I need a specific Crossplane version to run Controllers?
+
+Yes, you need to use Crossplane v1.19.0 or later to use *Controllers*. This is because of the changes in the Crossplane codebase to support third-party package formats in dependencies.
+
+Spaces `v1.12.0` supports Crossplane `v1.19` in the *Rapid* release channel.
+
+
+
+
+Can I deploy Controllers outside of an Upbound control plane? With UXP?
+
+No, *Controllers* are a proprietary package format and are only available for control planes running in Spaces hosting environments in Upbound.
+
+
+
+
+[cli]: /manuals/uxp/overview
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-audit-logs.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-audit-logs.md
new file mode 100644
index 00000000..187f6785
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-audit-logs.md
@@ -0,0 +1,544 @@
+---
+title: Control plane audit logging
+---
+
+This guide explains how to enable and configure audit logging for control planes
+in Self-Hosted Upbound Spaces.
+
+Starting in Spaces `v1.14.0`, each control plane contains an API server that
+supports audit log collection. You can use audit logging to track creation,
+updates, and deletions of Crossplane resources. Control plane audit logs
+use observability features to collect audit logs with `SharedTelemetryConfig` and
+send logs to an OpenTelemetry (`OTEL`) collector.
+
+
+## Prerequisites
+
+Before you begin, make sure you have:
+
+* Spaces `v1.14.0` or greater
+* Admin access to your Spaces host cluster
+* `kubectl` configured to access the host cluster
+* `helm` installed
+* `yq` installed
+* `up` CLI installed and logged in to your organization
+
+## Enable observability
+
+
+Observability graduated to General Available in `v1.14.0` but is disabled by
+default.
+
+
+
+
+
+### Before `v1.14`
+To enable the GA Observability feature, upgrade your Spaces installation to `v1.14.0`
+or later and update your installation setting to the new flag:
+
+```diff
+helm upgrade spaces upbound/spaces -n upbound-system \
+- --set "features.alpha.observability.enabled=true"
++ --set "observability.enabled=true"
+```
+
+
+
+### After `v1.14`
+
+To enable the GA Observability feature for `v1.14.0` and later, pass the feature
+flag:
+
+```sh
+helm upgrade spaces upbound/spaces -n upbound-system \
+ --set "observability.enabled=true"
+
+```
+
+
+
+
+To confirm Observability is enabled, run the `helm get values` command:
+
+
+```shell
+helm get values --namespace upbound-system spaces | yq .observability
+```
+
+Your output should return:
+
+```shell-noCopy
+ enabled: true
+```
+
+## Install an observability backend
+
+:::note
+If you already have an observability backend in your environment, skip to the
+next section.
+:::
+
+
+For this guide, you'll use Grafana's `docker-otel-lgtm` bundle to validate audit log
+generation. For production environments, configure a dedicated observability
+backend like Datadog, Splunk, or an enterprise-grade Grafana stack.
+
+
+
+First, make sure your `kubectl` context points to your Spaces host cluster:
+
+```shell
+kubectl config current-context
+```
+
+The output should return your cluster name.
+
+Next, install `docker-otel-lgtm` as a deployment using port-forwarding to
+connect to Grafana. Create a manifest file and paste the
+following configuration:
+
+```yaml title="otel-lgtm.yaml"
+apiVersion: v1
+kind: Namespace
+metadata:
+ name: observability
+---
+apiVersion: v1
+kind: Service
+metadata:
+ labels:
+ app: otel-lgtm
+ name: otel-lgtm
+ namespace: observability
+spec:
+ ports:
+ - name: grpc
+ port: 4317
+ protocol: TCP
+ targetPort: 4317
+ - name: http
+ port: 4318
+ protocol: TCP
+ targetPort: 4318
+ - name: grafana
+ port: 3000
+ protocol: TCP
+ targetPort: 3000
+ selector:
+ app: otel-lgtm
+---
+apiVersion: apps/v1
+kind: Deployment
+metadata:
+ name: otel-lgtm
+ labels:
+ app: otel-lgtm
+ namespace: observability
+spec:
+ replicas: 1
+ selector:
+ matchLabels:
+ app: otel-lgtm
+ template:
+ metadata:
+ labels:
+ app: otel-lgtm
+ spec:
+ containers:
+ - name: otel-lgtm
+ image: grafana/otel-lgtm
+ ports:
+ - containerPort: 4317
+ - containerPort: 4318
+ - containerPort: 3000
+```
+
+Next, apply the manifest:
+
+```shell
+kubectl apply --filename otel-lgtm.yaml
+```
+
+Your output should return the resources:
+
+```shell
+namespace/observability created
+ service/otel-lgtm created
+ deployment.apps/otel-lgtm created
+```
+
+To verify your resources deployed, use `kubectl get` to display resources with
+an `ACTIVE` or `READY` status.
+
+Next, forward the Grafana port:
+
+```shell
+kubectl port-forward svc/otel-lgtm --namespace observability 3000:3000
+```
+
+Now you can access the Grafana UI at http://localhost:3000.
+
+
+## Create an audit-enabled control plane
+
+To enable audit logging for a control plane, you need to label it so the
+`SharedTelemetryConfig` can identify and apply audit settings. This section
+creates a new control plane with the `audit-enabled: "true"` label. The
+`audit-enabled: "true"` label marks this control plane for audit logging. The
+`SharedTelemetryConfig` (created in the next section) finds control planes with
+this label and enables audit logging on them.
+
+Create a new manifest file and paste the configuration below:
+
+
+```yaml title="ctp-audit.yaml"
+apiVersion: v1
+kind: Namespace
+metadata:
+ name: audit-test
+---
+apiVersion: spaces.upbound.io/v1beta1
+kind: ControlPlane
+metadata:
+ labels:
+ audit-enabled: "true"
+ name: ctp1
+ namespace: audit-test
+spec:
+ writeConnectionSecretToRef:
+ name: kubeconfig-ctp1
+ namespace: audit-test
+```
+
+
+The `metadata.labels` section contains the `audit-enabled` setting.
+
+Apply the manifest:
+
+```shell
+kubectl apply --filename ctp-audit.yaml
+```
+
+Confirm your control plane reaches the `READY` status:
+
+```shell
+kubectl get --filename ctp-audit.yaml
+```
+
+## Create a `SharedTelemetryConfig`
+
+The `SharedTelemetryConfig` applies to all control plane objects in a namespace
+and enables audit logging and routes logs to your `OTEL` endpoint.
+
+Create a `SharedTelemetryConfig` manifest file and paste the configuration
+below:
+
+
+```yaml title="sharedtelemetryconfig.yaml"
+apiVersion: observability.spaces.upbound.io/v1alpha1
+kind: SharedTelemetryConfig
+metadata:
+ name: apiserver-audit
+ namespace: audit-test
+spec:
+ apiServer:
+ audit:
+ enabled: true
+ exporters:
+ otlphttp:
+ endpoint: http://otel-lgtm.observability:4318
+ exportPipeline:
+ logs: [otlphttp]
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ audit-enabled: "true"
+```
+
+
+This configuration:
+
+* Sets `apiServer.audit.enabled` to `true`
+* Configures the `otlphttp` exporter to point to the `docker-otel-lgtm` service
+* Uses `controlPlaneSelector` to match any control plane in the namespace with the `audit-enabled` label set to `true`
+
+:::note
+You can configure the `SharedTelemetryConfig` to select control planes in
+several ways. For more information on control plane selection, see the [control
+plane selection][ctp-selection] documentation.
+:::
+
+Apply the `SharedTelemetryConfig`:
+
+```shell
+kubectl apply --filename sharedtelemetryconfig.yaml
+```
+
+Confirm the configuration selected the control plane:
+
+```shell
+kubectl get --filename sharedtelemetryconfig.yaml
+```
+
+The output should return `SELECTED` as `1` and `VALIDATED` as `TRUE`.
+
+For more detailed status information, use `kubectl get`:
+
+```shell
+kubectl get --filename sharedtelemetryconfig.yaml --output yaml | yq .status
+```
+
+## Generate and monitor audit events
+
+You enabled telemetry on your new control plane and can now generate events to
+test the audit logging. This guide uses the `nop-provider` to simulate resource
+operations.
+
+Switch your `up` context to the new control plane:
+
+```shell
+up ctx ///
+```
+
+Create a new Provider manifest:
+
+```yaml title="provider-nop.yaml"
+apiVersion: pkg.crossplane.io/v1
+ kind: Provider
+ metadata:
+ name: crossplane-contrib-provider-nop
+ spec:
+ package: xpkg.upbound.io/crossplane-contrib/provider-nop:v0.4.0
+```
+
+Apply the provider manifest:
+
+```shell
+kubectl apply --filename provider-nop.yaml
+```
+
+Verify the provider installed and returns `HEALTHY` status as `TRUE`.
+
+Apply an example resource to kick off event generation:
+
+
+```shell
+kubectl apply --filename https://raw.githubusercontent.com/crossplane-contrib/provider-nop/refs/heads/main/examples/nopresource.yaml
+```
+
+In your Grafana dashboard, navigate to **Drilldown** > **Logs** under the
+Grafana menu.
+
+
+Filter for `controlplane-audit` log messages.
+
+Create a query to find `create` events on `nopresources` by filtering:
+
+* The `verb` field for `create` events
+* The `objectRef_resource` field to match the Kind `nopresources`
+
+Review the audit log results. The log stream displays:
+
+*The client applying the create operation
+* The resource kind
+* Client details
+* The response code
+
+Expand the example below for an audit log entry:
+
+
+ Audit log entry
+
+```json
+{
+ "level": "Metadata",
+ "auditID": "51bbe609-14ad-4874-be78-1289c10d506a",
+ "stage": "ResponseComplete",
+ "requestURI": "/apis/nop.crossplane.io/v1alpha1/nopresources?fieldManager=kubectl-client-side-apply&fieldValidation=Strict",
+ "verb": "create",
+ "user": {
+ "username": "kubernetes-admin",
+ "groups": ["system:masters", "system:authenticated"]
+ },
+ "impersonatedUser": {
+ "username": "upbound:spaces:host:masterclient",
+ "groups": [
+ "system:authenticated",
+ "upbound:controlplane:admin",
+ "upbound:spaces:host:system:masters"
+ ]
+ },
+ "sourceIPs": ["10.244.0.135", "127.0.0.1"],
+ "userAgent": "kubectl/v1.32.2 (darwin/arm64) kubernetes/67a30c0",
+ "objectRef": {
+ "resource": "nopresources",
+ "name": "example",
+ "apiGroup": "nop.crossplane.io",
+ "apiVersion": "v1alpha1"
+ },
+ "responseStatus": { "metadata": {}, "code": 201 },
+ "requestReceivedTimestamp": "2025-09-19T23:03:24.540067Z",
+ "stageTimestamp": "2025-09-19T23:03:24.557583Z",
+ "annotations": {
+ "authorization.k8s.io/decision": "allow",
+ "authorization.k8s.io/reason": "RBAC: allowed by ClusterRoleBinding \"controlplane-admin\" of ClusterRole \"controlplane-admin\" to Group \"upbound:controlplane:admin\""
+ }
+ }
+```
+
+
+## Customize the audit policy
+
+Spaces `v1.14.0` includes a default audit policy. You can customize this policy
+by creating a configuration file and passing the values to
+`observability.collectors.apiServer.auditPolicy` in the helm values file.
+
+An example custom audit policy:
+
+```yaml
+observability:
+ controlPlanes:
+ apiServer:
+ auditPolicy: |
+ apiVersion: audit.k8s.io/v1
+ kind: Policy
+ rules:
+ # ============================================================================
+ # RULE 1: Exclude health check and version endpoints
+ # ============================================================================
+ - level: None
+ nonResourceURLs:
+ - '/healthz*'
+ - '/readyz*'
+ - /version
+ # ============================================================================
+ # RULE 2: ConfigMaps - Write operations only
+ # ============================================================================
+ - level: Metadata
+ resources:
+ - group: ""
+ resources:
+ - configmaps
+ verbs:
+ - create
+ - update
+ - patch
+ - delete
+ omitStages:
+ - RequestReceived
+ - ResponseStarted
+ # ============================================================================
+ # RULE 3: Secrets - ALL operations
+ # ============================================================================
+ - level: Metadata
+ resources:
+ - group: ""
+ resources:
+ - secrets
+ verbs:
+ - get
+ - list
+ - watch
+ - create
+ - update
+ - patch
+ - delete
+ omitStages:
+ - RequestReceived
+ - ResponseStarted
+ # ============================================================================
+ # RULE 4: Global exclusion of read-only operations
+ # ============================================================================
+ - level: None
+ verbs:
+ - get
+ - list
+ - watch
+ # ==========================================================================
+ # RULE 5: Exclude standard Kubernetes resources from write operation logging
+ # ==========================================================================
+ - level: None
+ resources:
+ - group: ""
+ - group: "apps"
+ - group: "networking.k8s.io"
+ - group: "policy"
+ - group: "rbac.authorization.k8s.io"
+ - group: "storage.k8s.io"
+ - group: "batch"
+ - group: "autoscaling"
+ - group: "metrics.k8s.io"
+ - group: "node.k8s.io"
+ - group: "scheduling.k8s.io"
+ - group: "coordination.k8s.io"
+ - group: "discovery.k8s.io"
+ - group: "events.k8s.io"
+ - group: "flowcontrol.apiserver.k8s.io"
+ - group: "internal.apiserver.k8s.io"
+ - group: "authentication.k8s.io"
+ - group: "authorization.k8s.io"
+ - group: "admissionregistration.k8s.io"
+ verbs:
+ - create
+ - update
+ - patch
+ - delete
+ # ============================================================================
+ # RULE 6: Catch-all for ALL custom resources and any missed resources
+ # ============================================================================
+ - level: Metadata
+ verbs:
+ - create
+ - update
+ - patch
+ - delete
+ omitStages:
+ - RequestReceived
+ - ResponseStarted
+ # ============================================================================
+ # RULE 7: Final catch-all - exclude everything else
+ # ============================================================================
+ - level: None
+ omitStages:
+ - RequestReceived
+ - ResponseStarted
+```
+You can apply this policy during Spaces installation or upgrade using the helm values file.
+
+Audit policies use rules evaluated in order from top to bottom where the first
+matching rule applies. Control plane audit policies follow Kubernetes conventions and use the
+following logging levels:
+
+* **None** - Don't log events matching this rule
+* **Metadata** - Log request metadata (user, timestamp, resource, verb) but not request or response bodies
+* **Request** - Log metadata and request body but not response body
+* **RequestResponse** - Log metadata, request body, and response body
+
+For more information, review the Kubernetes [Auditing] documentation.
+
+## Disable audit logging
+
+You can disable audit logging on a control plane by removing it from the
+`SharedTelemetryConfig` selector or by deleting the `SharedTelemetryConfig`.
+
+### Disable for specific control planes
+
+Remove the `audit-enabled` label from control planes that should stop sending audit logs:
+
+```bash
+kubectl label controlplane --namespace audit-enabled-
+```
+
+The `SharedTelemetryConfig` no longer selects this control plane, and audit log collection stops.
+
+### Disable for all control planes
+
+Delete the `SharedTelemetryConfig` to stop audit logging for all control planes it manages:
+
+```bash
+kubectl delete sharedtelemetryconfig --namespace
+```
+
+[ctp-selection]: /self-hosted-spaces/howtos/observability/#control-plane-selection
+[Auditing]: https://kubernetes.io/docs/tasks/debug/debug-cluster/audit/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-connector.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-connector.md
new file mode 100644
index 00000000..5fcf1684
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ctp-connector.md
@@ -0,0 +1,499 @@
+---
+title: Control Plane Connector
+weight: 80
+description: A guide for how to connect a Kubernetes app cluster to a control plane in Upbound using the Control Plane connector feature
+plan: "standard"
+---
+
+
+
+Control Plane Connector connects arbitrary Kubernetes application clusters outside the
+Upbound Spaces to your control planes running in Upbound Spaces.
+This lets you interact with your control plane's API from the app cluster. The claim APIs and the namespaced XR APIs
+you define via CompositeResourceDefinitions (XRDs) in the control plane, are available in
+your app cluster alongside Kubernetes workload APIs like Pod. Control Plane Connector
+enables the same experience as a locally installed Crossplane.
+
+
+
+### Control Plane Connector operations
+
+Control Plane Connector leverages the [Kubernetes API AggregationLayer][kubernetes-api-aggregationlayer]
+to create an extension API server and serve the claim APIs and the namespaced XR APIs in the control plane. It
+discovers the claim APIs and the namespaced XR APIs available in the control plane and registers corresponding
+APIService resources on the app cluster. Those APIService resources refer to the
+extension API server of Control Plane Connector.
+
+The claim APIs and the namespaced XR APIs are available in your Kubernetes cluster, just like all native
+Kubernetes APIs.
+
+The Control Plane Connector processes every request targeting the claim APIs and the namespaced XR APIs and makes the
+relevant requests to the connected control plane.
+
+Only the connected control plane stores and processes all claims and namespaced XRs created in the app
+cluster, eliminating any storage use at the application cluster. The control plane
+connector provisions a target namespace at the control plane for the app cluster and stores
+all claims and namespaced XRs in this target namespace.
+
+For managing the claims and namespaced XRs, the Control Plane Connector creates a unique identifier for a
+resource by combining input parameters from claims, including:
+- `metadata.name`
+- `metadata.namespace`
+- `your cluster name`
+
+
+It employs SHA-256 hashing to generate a hash value and then extracts the first
+16 characters of that hash. This ensures the resulting identifier remains within
+the 64-character limit in Kubernetes.
+
+
+
+For instance, if a claim named `my-bucket` exists in the test namespace in
+`cluster-dev`, the system calculates the SHA-256 hash from
+`my-bucket-x-test-x-00000000-0000-0000-0000-000000000000` and takes the first 16
+characters. The control plane side then names the claim `claim-c603e518969b413e`.
+
+For namespaced XRs, the process is similar, only the prefix is different.
+The name becomes `nxr-c603e518969b413e`.
+
+
+### Installation
+
+
+
+
+
+Log in with the up CLI:
+
+```bash
+up login
+```
+
+Connect your app cluster to a namespace in an Upbound control plane with `up controlplane connector install `. This command creates a user token and installs the Control Plane Connector to your cluster. It's recommended you create a values file called `connector-values.yaml` and provide the following below. Select the tab according to which environment your control plane is running in.
+
+
+
+
+
+
+```yaml
+upbound:
+ # This is your org account in Upbound e.g. the name displayed after executing `up org list`
+ account:
+ # This is a personal access token generated in the Upbound Console
+ token:
+
+spaces:
+ # If your control plane is running in Upbound's GCP Cloud Space, else use upbound-aws-us-east-1.spaces.upbound.io
+ host: "upbound-gcp-us-west-1.spaces.upbound.io"
+ insecureSkipTLSVerify: true
+ controlPlane:
+ # The name of the control plane you want the Connector to attach to
+ name:
+ # The control plane group the control plane resides in
+ group:
+ # The namespace within the control plane to sync claims from the app cluster to. NOTE: This must be created before you install the connector.
+ claimNamespace:
+```
+
+
+
+
+
+1. Create a [kubeconfig][kubeconfig] for the control plane. Update your Upbound context to the path for your desired control plane.
+```ini
+up login
+up ctx /upbound-gcp-us-central-1/default/your-control-plane
+up ctx . -f - > context.yaml
+```
+
+2. Write it to a secret in the cluster where you plan to
+install the Control Plane Connector to.
+```ini
+kubectl create secret generic my-controlplane-kubeconfig --from-file=context.yaml
+```
+
+3. Reference this secret in the
+`spaces.controlPlane.kubeconfigSecret` field below.
+
+```yaml
+spaces:
+ controlPlane:
+ # The namespace within the control plane to sync claims from the app cluster to. NOTE: This must be created before you install the connector.
+ claimNamespace:
+ kubeconfigSecret:
+ name: my-controlplane-kubeconfig
+ key: kubeconfig
+```
+
+
+
+
+
+
+Provide the values file above when you run the CLI command:
+
+
+```bash {copy-lines="3"}
+up controlplane connector install my-control-plane my-app-ns-1 --file=connector-values.yaml
+```
+
+The Claim APIs and the namespaced XR APIs from your control plane are now visible in the cluster.
+You can verify this with `kubectl api-resources`.
+
+```bash
+kubectl api-resources
+```
+
+### Uninstall
+
+Disconnect an app cluster that you prior installed the Control Plane Connector on by
+running the following:
+
+```bash
+up ctp connector uninstall
+```
+
+This command uninstalls the helm chart for the Control Plane Connector from an app
+cluster. It moves any claims in the app cluster into the control plane
+at the specified namespace.
+
+:::tip
+Ensure your kubeconfig's current context points to the app cluster where you uninstall Control Plane Connector.
+:::
+
+
+
+
+It's recommended you create a values file called `connector-values.yaml` and
+provide the following below. Select the tab according to which environment your
+control plane is running in.
+
+
+
+
+
+
+```yaml
+upbound:
+ # This is your org account in Upbound e.g. the name displayed after executing `up org list`
+ account:
+ # This is a personal access token generated in the Upbound Console
+ token:
+
+spaces:
+ # Upbound GCP US-West-1 upbound-gcp-us-west-1.spaces.upbound.io
+ # Upbound AWS US-East-1 upbound-aws-us-east-1.spaces.upbound.io
+ # Upbound GCP US-Central-1 upbound-gcp-us-central-1.spaces.upbound.io
+ host: ""
+ insecureSkipTLSVerify: true
+ controlPlane:
+ # The name of the control plane you want the Connector to attach to
+ name:
+ # The control plane group the control plane resides in
+ group:
+ # The namespace within the control plane to sync claims from the app cluster to.
+ # NOTE: This must be created before you install the connector.
+ claimNamespace:
+```
+
+
+
+
+Create a [kubeconfig][kubeconfig-1] for the
+control plane. Write it to a secret in the cluster where you plan to
+install the Control Plane Connector to. Reference this secret in the
+`spaces.controlPlane.kubeconfigSecret` field below.
+
+```yaml
+spaces:
+ controlPlane:
+ # The namespace within the control plane to sync claims from the app cluster to. NOTE: This must be created before you install the connector.
+ claimNamespace:
+ kubeconfigSecret:
+ name: my-controlplane-kubeconfig
+ key: kubeconfig
+```
+
+
+
+
+
+
+Provide the values file above when you `helm install` the Control Plane Connector:
+
+
+```bash
+helm install --wait mcp-connector oci://xpkg.upbound.io/spaces-artifacts/mcp-connector -n kube-system -f connector-values.yaml
+```
+:::tip
+Create an API token from the Upbound user account settings page in the console by following [these instructions][these-instructions].
+:::
+
+### Uninstall
+
+You can uninstall Control Plane Connector with Helm by running the following:
+
+```bash
+helm uninstall mcp-connector
+```
+
+
+
+
+
+### Example usage
+
+This example creates a control plane using [Configuration
+EKS][configuration-eks]. `KubernetesCluster` is
+available as a claim API in your control plane. The following is [an
+example][an-example]
+object you can create in your control plane.
+
+```yaml
+apiVersion: k8s.starter.org/v1alpha1
+kind: KubernetesCluster
+metadata:
+ name: my-cluster
+ namespace: default
+spec:
+ id: my-cluster
+ parameters:
+ nodes:
+ count: 3
+ size: small
+ services:
+ operators:
+ prometheus:
+ version: "34.5.1"
+ writeConnectionSecretToRef:
+ name: my-cluster-kubeconfig
+```
+
+After connecting your Kubernetes app cluster to the control plane, you
+can create the `KubernetesCluster` object in your app cluster. Although your
+local cluster has an Object, the actual resources is in your managed control
+plane inside Upbound.
+
+```bash {copy-lines="3"}
+# Applying the claim YAML above.
+# kubectl is set up to talk with your Kubernetes cluster.
+kubectl apply -f claim.yaml
+
+
+kubectl get claim -A
+NAME SYNCED READY CONNECTION-SECRET AGE
+my-cluster True True my-cluster-kubeconfig 2m
+```
+
+Once Kubernetes creates the object, view the console to see your object.
+
+
+
+You can interact with the object through your cluster just as if it
+lives in your cluster.
+
+### Migration to control planes
+
+This guide covers migrating a Crossplane installation to Upbound-managed control planes. It uses the Control Plane Connector to manage claims on an application cluster.
+
+
+
+#### Export all resources
+
+Before proceeding, ensure that you have set the correct kubecontext for your application
+cluster.
+
+```bash
+up controlplane migration export --pause-before-export --output=my-export.tar.gz --yes
+```
+
+This command performs the following:
+- Pauses all claim, composite, and managed resources before export.
+- Scans the control plane for resource types.
+- Exports Crossplane and native resources.
+- Archives the exported state into `my-export.tar.gz`.
+
+Example output:
+```bash
+Exporting control plane state...
+ ✓ Pausing all claim resources before export... 1 resources paused! ⏸️
+ ✓ Pausing all composite resources before export... 7 resources paused! ⏸️
+ ✓ Pausing all managed resources before export... 34 resources paused! ⏸️
+ ✓ Scanning control plane for types to export... 231 types found! 👀
+ ✓ Exporting 231 Crossplane resources...125 resources exported! 📤
+ ✓ Exporting 3 native resources...19 resources exported! 📤 ✓ Archiving exported state... archived to "my-export.tar.gz"! 📦
+
+Successfully exported control plane state!
+```
+
+#### Import all resources
+
+The system restores the target control plane with the exported
+resources, which serves as the destination for the Control Plane Connector.
+
+
+Log into Upbound and select the correct context:
+
+```bash
+up login
+up ctx
+up ctp create ctp-a
+```
+
+Output:
+```bash
+ctp-a created
+```
+
+Verify that the Crossplane version on both the application cluster and the new managed
+control plane matches the core Crossplane version.
+
+Use the following command to import the resources:
+```bash
+up controlplane migration import -i my-export.tar.gz \
+ --unpause-after-import \
+ --mcp-connector-cluster-id=my-appcluster \
+ --mcp-connector-claim-namespace=my-appcluster
+```
+
+This command:
+- Note: `--mcp-connector-cluster-id` needs to be unique per application cluster
+- Note: `--mcp-connector-claim-namespace` is the namespace the system creates
+ during the import
+- Restores base resources
+- Waits for XRDs and packages to establish
+- Imports Claims, XRs resources
+- Finalizes the import and resumes managed resources
+
+Example output:
+```bash
+Importing control plane state...
+ ✓ Reading state from the archive... Done! 👀
+ ✓ Importing base resources... 56 resources imported!📥
+ ✓ Waiting for XRDs... Established! ⏳
+ ✓ Waiting for Packages... Installed and Healthy! ⏳
+ ✓ Importing remaining resources... 88 resources imported! 📥
+ ✓ Finalizing import... Done! 🎉
+ ✓ Unpausing managed resources ... Done! ▶️
+
+fully imported control plane state!
+```
+
+Verify Imported Claims
+
+
+The Control Plane Connector renames all claims and adds additional labels to them.
+
+```bash
+kubectl get claim -A
+```
+
+Example output:
+```bash
+NAMESPACE NAME SYNCED READY CONNECTION-SECRET AGE
+my-appcluster cluster.aws.platformref.upbound.io/claim-e708ff592b974f51 True True platform-ref-aws-kubeconfig 3m17s
+```
+
+Inspect the labels:
+```bash
+kubectl get -n my-appcluster cluster.aws.platformref.upbound.io/claim-e708ff592b974f51 -o yaml | yq .metadata.labels
+```
+
+Example output:
+```bash
+mcp-connector.upbound.io/app-cluster: my-appcluster
+mcp-connector.upbound.io/app-namespace: default
+mcp-connector.upbound.io/app-resource-name: example
+```
+
+#### Cleanup the app cluster
+
+Remove all Crossplane-related resources from the application cluster, including:
+
+- Managed Resources
+- Claims
+- Compositions
+- XRDs
+- Packages (Functions, Configurations, Providers)
+- Crossplane and all associated CRDs
+
+
+#### Install Control Plane Connector
+
+
+Follow the preceding installation guide and configure the `connector-values.yaml`:
+
+```yaml
+# NOTE: clusterID needs to match --mcp-connector-cluster-id used in the import on the managed control Plane
+clusterID: my-appcluster
+upbound:
+ account:
+ token:
+
+spaces:
+ host: ""
+ insecureSkipTLSVerify: true
+ controlPlane:
+ name:
+ group:
+ # NOTE: This is the --mcp-connector-claim-namespace used during the import to the control plane
+ claimNamespace:
+```
+Once the Control Plane Connector installs, verify that resources exist in the application
+cluster:
+
+```bash
+kubectl api-resources | grep platform
+```
+
+Example output:
+```bash
+awslbcontrollers aws.platform.upbound.io/v1alpha1 true AWSLBController
+podidentities aws.platform.upbound.io/v1alpha1 true PodIdentity
+sqlinstances aws.platform.upbound.io/v1alpha1 true SQLInstance
+clusters aws.platformref.upbound.io/v1alpha1 true Cluster
+osss observe.platform.upbound.io/v1alpha1 true Oss
+apps platform.upbound.io/v1alpha1 true App
+```
+
+Restore claims from the control plane to the application cluster:
+
+```bash
+kubectl get claim -A
+```
+
+Example output:
+```bash
+NAMESPACE NAME SYNCED READY CONNECTION-SECRET AGE
+default cluster.aws.platformref.upbound.io/example True True platform-ref-aws-kubeconfig 127m
+```
+
+With this guide, you migrated your Crossplane installation to
+Upbound-control planes. This ensures seamless integration with your
+application cluster using the Control Plane Connector.
+
+### Connect multiple app clusters to a control plane
+
+Claims are store in a unique namespace in the Upbound control plane.
+Every cluster creates a new control plane namespace.
+
+
+
+There's no limit on the number of clusters connected to a single control plane.
+Control plane operators can see all their infrastructure in a central control
+plane.
+
+Without using control planes and Control Plane Connector, users have to install
+Crossplane and providers for cluster. Each cluster requires configuration for
+providers with necessary credentials. With a single control plane where multiple
+clusters connected through Upbound tokens, you don't need to give out any cloud
+credentials to the clusters.
+
+
+[kubeconfig]: /manuals/cli/howtos/context-config/#generate-a-kubeconfig-for-a-control-plane-in-a-group
+[kubeconfig-1]:/self-hosted-spaces/concepts/control-planes/#connect-directly-to-your-control-plane
+[these-instructions]:/manuals/console/upbound-console/#create-a-personal-access-token
+[kubernetes-api-aggregationlayer]: https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/
+[configuration-eks]: https://github.com/upbound/configuration-eks
+[an-example]: https://github.com/upbound/configuration-eks/blob/9f86b6d/.up/examples/cluster.yaml
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/debugging-a-ctp.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/debugging-a-ctp.md
new file mode 100644
index 00000000..b7201283
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/debugging-a-ctp.md
@@ -0,0 +1,123 @@
+---
+title: Debugging issues on a control plane
+sidebar_position: 70
+description: A guide for how to debug resources on a control plane running in Upbound.
+---
+
+This guide provides troubleshooting guidance for how to identify and fix issues on a control plane.
+
+
+## Start from Upbound Console
+
+
+The Upbound [Console][console] has a built-in control plane explorer experience
+that surfaces status and events for the resources on your control plane. The
+explorer is claim-based. Resources in this view exist only if they exist in the
+reference chain originating from a claim. This view is a helpful starting point
+if you are attempting to debug an issue originating from a claim.
+
+:::tip
+If you directly create Crossplane Managed Resources (`MR`s) or Composite
+Resources (`XR`s), they don't render in the explorer.
+:::
+
+### Example
+
+The example below uses the control plane explorer view to inspect why a claim for an EKS Cluster isn't healthy.
+
+#### Check the health status of claims
+
+From the API type card, two claims branching from of it: one shows a healthy green icon, while the other shows an unhealthy red icon.
+
+
+
+Select `More details` on the unhealthy claim card and Upbound shows details for the claim.
+
+
+
+Looking at the three events for this claim:
+
+- **ConfigureCompositeResource**: this event indicates Upbound created the claimed Composite Resource (`XR`).
+
+- **BindCompositeResource**: this indicates the Composite Resource (`XR`) that's being "claimed" isn't ready yet. A claim doesn't show `HEALTHY` until the XR it references is ready.
+
+- **ConfigureCompositeResource**: the error saying, `cannot apply composite resource...the object has been modified; please apply your changes to the latest version and try again` is a generic event from Crossplane resources. It's safe to ignore this error.
+
+Next, look at the `status` field of the rendered YAML for the resource.
+
+
+
+The status reports a similar message as the event stream: this claim is waiting for a Composite Resource to be ready. Based on this, investigate the Composite Resource referenced by this claim next.
+
+#### Check the health status of the Composite Resource
+
+
+The control plane explorer only shows the claim cards by default. Selecting the claim card renders the rest of the Crossplane resource tree associated with the selected claim.
+
+
+The previous claim expands into this screenshot:
+
+
+
+This renders the XR referenced by the claim (along with all its references). You can see the XR is showing the same unhealthy status icon in its card. Notice the XR has itself two nested XRs. One of the nested XRs shows a healthy green icon on its card, while the other shows an unhealthy red icon. Like the claim, a Composite Resource doesn't show healthy until all referenced resources also show healthy.
+
+#### Inspecting Managed Resources
+
+Select `more details` to inspect one of the unhealthy Managed Resources shows the following:
+
+
+
+This event reveals it's unhealthy because it's waiting on a reference to another Managed Resource. Searching the rendered YAML of the MR for this resource shows the following:
+
+
+
+The rendered YAML shows this MR is referencing a sibling MR that shares the same controller. The same parent XR created both of these managed resources. Inspect the sibling MR to see what its status is.
+
+
+
+The sibling MR event stream shows the Provider processed the resource create request. Ignore the `CannotInitalizeManagedResrouce` event. EKS clusters can take 15 minutes or more to provision in AWS. The root cause is everything is fine -- all the resources are still provisioning. Waiting longer and then looking at the control plane explorer again, shows all resources are healthy. For reference, below is an example status field for a resource that's healthy and provisioned.
+
+```yaml
+...
+status:
+ atProvider:
+ id: team-b-app-cluster-bhwfb-hwtgs-20230403135452772300000008
+ conditions:
+ - lastTransitionTime: '2023-04-03T13:56:35Z'
+ reason: Available
+ status: 'True'
+ type: Ready
+ - lastTransitionTime: '2023-04-03T13:54:02Z'
+ reason: ReconcileSuccess
+ status: 'True'
+ type: Synced
+ - lastTransitionTime: '2023-04-03T13:54:53Z'
+ reason: Success
+ status: 'True'
+ type: LastAsyncOperation
+ - lastTransitionTime: '2023-04-03T13:54:53Z'
+ reason: Finished
+ status: 'True'
+ type: AsyncOperation
+```
+
+### Control plane explorer limitations
+
+The control plane explorer view is currently designed around claims (`XC`s). The control plane explorer doesn't inspect other Crossplane resources. To inspect other Crossplane resources, use the `up` CLI.
+
+Some examples of Crossplane resources that require the `up` CLI
+
+- Managed Resources that aren't associated with a claim
+- Composite Resources that aren't associated with a claim
+- The status of _deleting_ resources
+- ProviderConfigs
+- Provider events
+
+## Use direct CLI access
+
+If your preference is to use a terminal instead of a GUI, Upbound supports direct access to the API server of the control plane. Use [`up ctx`][up-ctx] to connect directly to your control plane.
+
+
+[console]: /manuals/console/upbound-console
+[up-ctx]: /reference/cli-reference
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/declarative-ctps.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/declarative-ctps.md
new file mode 100644
index 00000000..2674ca52
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/declarative-ctps.md
@@ -0,0 +1,105 @@
+---
+title: Declaratively create control planes
+sidebar_position: 99
+description: A tutorial to configure a Space with Argo to declaratively create and
+ manage control planes
+---
+
+In this tutorial, you learn how to configure [Argo CD][argo-cd] to communicate with a self-hosted Space. This flow allows you to declaratively create and manage control planes from Git. Argo CD is a continuous delivery tool for Kubernetes that you can use to drive GitOps flows for your control plane infrastructure.
+
+
+## Prerequisites
+
+To complete this tutorial, you need the following:
+
+- Have already deployed an Upbound Space.
+- Have already deployed an instance of Argo CD on a Kubernetes cluster.
+
+## Connect your Space to Argo CD
+
+Fetch the kubeconfig for the Space cluster, the Kubernetes cluster where you installed the Upbound Spaces software. You must add the Space cluster as a context to Argo.
+
+```ini
+export SPACES_CLUSTER_SERVER="https://url"
+export SPACES_CLUSTER_NAME="cluster"
+```
+
+Switch contexts to the Kubernetes cluster where you've installed Argo. Create a secret on the Argo cluster whose data contains the connection details of the Space cluster.
+
+:::important
+Run the following commands against your **Argo** cluster, not your Space cluster.
+:::
+
+Run the following command in a terminal:
+
+```yaml
+cat <
+
+
+:::important
+
+This feature is in preview. The Query API is available in the Cloud Space offering in `v1.6` and enabled by default.
+
+Since Spaces `v1.8.0`, you must enable Query API to connect a Space.
+
+Use this guide to enable Query API in your Space.
+:::
+
+Upbound's Query API allows users to inspect objects and resources within their control planes. The read-only `up alpha query` and `up alpha get` CLI commands allow you to gather information on your control planes in a fast and efficient package. These commands follow the [`kubectl` conventions][kubectl-conventions] for filtering, sorting, and retrieving information from your Space.
+
+Query API requires a PostgreSQL database to store the data. You can use the default PostgreSQL instance provided by Upbound or bring your own PostgreSQL instance.
+
+## Managed setup
+
+:::tip
+If you don't have specific requirements for your setup, Upbound recommends following this approach.
+:::
+
+To enable this feature, set `features.alpha.apollo.enabled=true` and `apollo.apollo.storage.postgres.create=true` when installing Spaces.
+
+However, you need to install CloudNativePG (`CNPG`) to provide the PostgreSQL instance. You can let the `up` CLI do this for you, or install it manually.
+
+For more customization, see the [Helm chart reference][helm-chart-reference]. You can modify the number
+of PostgreSQL instances, pooling instances, storage size, and more.
+
+If you have specific requirements not addressed in the Helm chart, see below for more information on how to bring your own [PostgreSQL setup][postgresql-setup].
+
+### Using the up CLI
+
+Before you begin, make sure you have the most recent version of the [`up` CLI installed][up-cli-installed].
+
+To enable this feature, set `features.alpha.apollo.enabled=true` and `apollo.apollo.storage.postgres.create=true` when installing Spaces:
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "features.alpha.apollo.enabled=true" \
+ --set "apollo.apollo.storage.postgres.create=true"
+```
+
+`up space init` and `up space upgrade` install CloudNativePG automatically, if needed.
+
+### Helm chart
+
+If you are installing the Helm chart in some other way, you can manually install CloudNativePG in one of the [supported ways][supported-ways], for example:
+
+```shell
+kubectl apply --server-side -f \
+ https://github.com/cloudnative-pg/cloudnative-pg/releases/download/v1.24.1/cnpg-1.24.1.yaml
+kubectl rollout status -n cnpg-system deployment cnpg-controller-manager -w --timeout 120s
+```
+
+Next, install the Spaces Helm chart with the necessary values, for example:
+
+```shell
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ ...
+ --set "features.alpha.apollo.enabled=true" \
+ --set "apollo.apollo.storage.postgres.create=true" \
+ --wait
+```
+
+## Self-hosted PostgreSQL configuration
+
+
+If your workflow requires more customization, you can provide your own
+PostgreSQL instance and configure credentials manually.
+
+Using your own PostgreSQL instance requires careful architecture consideration.
+Review the architecture and requirements guidelines.
+
+### Architecture
+
+The Query API architecture uses three components, other than a PostgreSQL database:
+* **Apollo Syncers**: Watching `ETCD` for changes and syncing them to PostgreSQL. One, or more, per control plane.
+* **Apollo Server**: Serving the Query API out of the data in PostgreSQL. One, or more, per Space.
+
+The default setup also uses the `PgBouncer` connection pooler to manage connections from the syncers.
+```mermaid
+graph LR
+ User[User]
+
+ subgraph Cluster["Cluster (Spaces)"]
+ direction TB
+ Apollo[apollo]
+
+ subgraph ControlPlanes["Control Planes"]
+ APIServer[API Server]
+ Syncer[apollo-syncer]
+ end
+ end
+
+ PostgreSQL[(PostgreSQL)]
+
+ User -->|requests| Apollo
+
+ Apollo -->|connects| PostgreSQL
+ Apollo -->|creates schemas & users| PostgreSQL
+
+ Syncer -->|watches| APIServer
+ Syncer -->|writes| PostgreSQL
+
+ PostgreSQL -->|data| Apollo
+
+ style PostgreSQL fill:#e1f5ff,stroke:#333,stroke-width:2px,color:#000
+ style Apollo fill:#ffe1e1,stroke:#333,stroke-width:2px,color:#000
+ style Cluster fill:#f0f0f0,stroke:#333,stroke-width:2px,color:#000
+ style ControlPlanes fill:#fff,stroke:#666,stroke-width:1px,stroke-dasharray: 5 5,color:#000
+```
+
+
+Each component needs to connect to the PostgreSQL database.
+
+In the event of database issues, you can provide a new database and the syncers
+automatically repopulate the data.
+
+### Requirements
+
+* A PostgreSQL 16 instance or cluster.
+* A database, for example named `upbound`.
+* **Optional**: A dedicated user for the Apollo Syncers, otherwise the Spaces Controller generates a dedicated set of credentials per syncer with the necessary permissions, for example named `syncer`.
+* A dedicated **superuser or admin account** for the Apollo Server.
+* **Optional**: A connection pooler, like PgBouncer, to manage connections from the Apollo Syncers. If you didn't provide the optional users, you might have to configure the pooler to allow users to connect using the same credentials as PostgreSQL.
+* **Optional**: A read replica for the Apollo Syncers to connect to, to reduce load on the primary database, this might cause a slight delay in the data being available through the Query API.
+
+Below you can find examples of setups to get you started, you can mix and match the examples to suit your needs.
+
+### In-cluster setup
+
+
+:::tip
+
+If you don't have strong opinions on your setup, but still want full control on
+the resources created for some unsupported customizations, Upbound recommends
+the in-cluster setup.
+
+:::
+
+
+For more customization than the managed setup, you can use CloudNativePG for
+PostgreSQL in the same cluster.
+
+For in-cluster setup, manually deploy the operator in one of the [supported ways][supported-ways-1], for example:
+
+```shell
+kubectl apply --server-side -f \
+ https://github.com/cloudnative-pg/cloudnative-pg/releases/download/v1.24.1/cnpg-1.24.1.yaml
+kubectl rollout status -n cnpg-system deployment cnpg-controller-manager -w --timeout 120s
+```
+
+Then create a `Cluster` and `Pooler` in the `upbound-system` namespace, for example:
+
+```shell
+kubectl create ns upbound-system
+
+kubectl apply -f - <
+
+### External setup
+
+
+:::tip
+Use this method if you decide the `apollo` manager can manage credentials , but your
+PostgreSQL instance is outside the cluster.
+:::
+
+When using this setup, you must manually create the required Secrets in the
+`upbound-system` namespace. The `apollo` user must have permissions to create
+schemas and users.
+
+```shell
+
+kubectl create ns upbound-system
+
+# A Secret containing the necessary credentials to connect to the PostgreSQL instance
+kubectl create secret generic spaces-apollo-pg-app -n upbound-system \
+ --from-literal=password=supersecret
+
+# A Secret containing the necessary CA certificate to verify the connection to the PostgreSQL instance
+kubectl create secret generic spaces-apollo-pg-ca -n upbound-system \
+ --from-file=ca.crt=/path/to/ca.crt
+```
+
+Next, install Spaces with the necessary settings:
+
+```shell
+export PG_URL=your-postgres-host:5432
+export PG_POOLED_URL=your-pgbouncer-host:5432 # this could be the same as above
+
+helm upgrade --install ... \
+ --set "features.alpha.apollo.enabled=true" \
+ --set "apollo.apollo.storage.postgres.create=false" \
+ --set "apollo.apollo.storage.postgres.connection.url=$PG_URL" \
+ --set "apollo.apollo.storage.postgres.connection.credentials.secret.name=spaces-apollo-pg-app" \
+ --set "apollo.apollo.storage.postgres.connection.credentials.format=basicauth" \
+ --set "apollo.apollo.storage.postgres.connection.ca.name=spaces-apollo-pg-ca" \
+ --set "apollo.apollo.storage.postgres.connection.syncer.url=$PG_POOLED_URL"
+```
+
+### External setup with all custom credentials
+
+For custom credentials with Apollo Syncers or Server, create a new secret in the
+`upbound-system` namespace:
+
+```shell
+export APOLLO_SYNCER_USER=syncer
+export APOLLO_SERVER_USER=apollo
+
+kubectl create ns upbound-system
+
+# A Secret containing the necessary credentials to connect to the PostgreSQL instance
+kubectl create secret generic spaces-apollo-pg-app -n upbound-system \
+ --from-literal=password=supersecret
+
+# A Secret containing the necessary CA certificate to verify the connection to the PostgreSQL instance
+kubectl create secret generic spaces-apollo-pg-ca -n upbound-system \
+ --from-file=ca.crt=/path/to/ca.crt
+
+# A Secret containing the necessary credentials for the Apollo Syncers to connect to the PostgreSQL instance.
+# These will be used by all Syncers in the Space.
+kubectl create secret generic spaces-apollo-pg-syncer -n upbound-system \
+ --from-literal=username=$APOLLO_SYNCER_USER \
+ --from-literal=password=supersecret
+
+# A Secret containing the necessary credentials for the Apollo Server to connect to the PostgreSQL instance.
+kubectl create secret generic spaces-apollo-pg-apollo -n upbound-system \
+ --from-literal=username=$APOLLO_SERVER_USER \
+ --from-literal=password=supersecret
+```
+
+Next, install Spaces with the necessary settings:
+
+```shell
+export PG_URL=your-postgres-host:5432
+export PG_POOLED_URL=your-pgbouncer-host:5432 # this could be the same as above
+
+helm ... \
+ --set "features.alpha.apollo.enabled=true" \
+ --set "apollo.apollo.storage.postgres.create=false" \
+ --set "apollo.apollo.storage.postgres.connection.url=$PG_URL" \
+ --set "apollo.apollo.storage.postgres.connection.credentials.secret.name=spaces-apollo-pg-app" \
+ --set "apollo.apollo.storage.postgres.connection.credentials.format=basicauth" \
+ --set "apollo.apollo.storage.postgres.connection.ca.name=spaces-apollo-pg-ca" \
+ --set "apollo.apollo.storage.postgres.connection.syncer.url=$PG_POOLED_URL" \
+
+ # For the syncers
+ --set "apollo.apollo.storage.postgres.connection.syncer.credentials.format=basicauth" \
+ --set "apollo.apollo.storage.postgres.connection.syncer.credentials.user=$APOLLO_SYNCER_USER" \
+ --set "apollo.apollo.storage.postgres.connection.syncer.credentials.secret.name=spaces-apollo-pg-syncer" \
+
+ # For the server
+ --set "apollo.apollo.storage.postgres.connection.apollo.credentials.format=basicauth" \
+ --set "apollo.apollo.storage.postgres.connection.apollo.credentials.user=$APOLLO_SERVER_USER" \
+ --set "apollo.apollo.storage.postgres.connection.apollo.credentials.secret.name=spaces-apollo-pg-apollo" \
+ --set "apollo.apollo.storage.postgres.connection.apollo.url=$PG_POOLED_URL"
+```
+
+
+## Using the Query API
+
+
+See the [Query API documentation][query-api-documentation] for more information on how to use the Query API.
+
+
+
+
+[postgresql-setup]: #self-hosted-postgresql-configuration
+[up-cli-installed]: /manuals/cli/overview
+[query-api-documentation]: /self-hosted-spaces/howtos/query-api
+
+[helm-chart-reference]: /reference/spaces-helm-reference/
+[kubectl-conventions]: https://kubernetes.io/docs/reference/kubectl/generated/kubectl_get/
+[supported-ways]: https://cloudnative-pg.io/documentation/current/installation_upgrade/
+[supported-ways-1]: https://cloudnative-pg.io/documentation/current/installation_upgrade/
+[cloudnativepg-documentation]: https://cloudnative-pg.io/documentation/1.24/storage/#configuration-via-a-pvc-template
+[postgresql-cluster]: https://cloudnative-pg.io/documentation/1.24/resource_management/
+[pooler]: https://cloudnative-pg.io/documentation/1.24/connection_pooling/#pod-templates
+[postgresql-cluster-2]: https://cloudnative-pg.io/documentation/1.24/replication/
+[pooler-3]: https://cloudnative-pg.io/documentation/1.24/connection_pooling/#high-availability-ha
+[postgresql-cluster-4]: https://cloudnative-pg.io/documentation/1.24/operator_capability_levels/#override-of-operand-images-through-the-crd
+[pooler-5]: https://cloudnative-pg.io/documentation/1.24/connection_pooling/#pod-templates
+[cloudnativepg-documentation-6]: https://cloudnative-pg.io/documentation/1.24/postgresql_conf/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/deployment-reqs.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/deployment-reqs.md
new file mode 100644
index 00000000..71d0ca08
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/deployment-reqs.md
@@ -0,0 +1,243 @@
+---
+title: Deployment Requirements
+sidebar_position: 2
+description: Deploy a Space in your production environment.
+---
+
+You need a Kubernetes cluster as the hosting environment to run Spaces. Upbound
+validates the Spaces software runs on [AWS EKS][aws-eks], [Google Cloud
+GKE][google-cloud-gke], and [Microsoft AKS][microsoft-aks]. Upbound recommends
+dedicating the Kubernetes cluster for the express purpose of running Spaces as
+its sole workload.
+
+## Kubernetes version compatibility
+
+Upbound tests each Spaces release against specific Kubernetes versions:
+
+| Spaces Version | Tested Kubernetes Versions |
+|----------------|----------------------------|
+| 1.16 | 1.33, 1.34, 1.35 |
+| 1.15 | 1.32, 1.33, 1.34, 1.35 |
+| 1.14 | 1.31, 1.32, 1.33, 1.34 |
+| 1.13 | 1.30, 1.31, 1.32, 1.33 |
+
+## Deployment requirements
+
+Spaces requires three things:
+
+1. A Kubernetes cluster.
+2. You've configured the Kubernetes cluster with the required prerequisites.
+3. You must have an [Upbound account][upbound-account]. Spaces is a feature only available for paying customers in the **Business Critical** tier of Upbound.
+
+This guide helps you think through all steps needed to deploy Spaces for production workloads.
+
+## Sizing a Space
+
+In a Space, the control planes you create get scheduled as pods across the
+cluster's node pools. The hyper scale cloud providers each offer managed
+Kubernetes services that can support hundreds of nodes in their node pools. That
+means the number of control planes you can run in a single Space is on the order
+hundreds--if not more.
+
+Rightsizing a Space for a production deployment depends on several factors:
+
+1. The number of control planes you plan to run in the Space.
+2. The number of managed resources you plan each control plane to reconcile.
+3. The Crossplane providers you plan to install in each control plane.
+
+### Memory considerations
+
+#### Control plane empty state memory usage
+
+An idle, empty control plane consumes about 640 MB of memory. This encompasses
+the set of pods that constitute a control plane and which get deployed for each
+control plane instance.
+
+#### Managed resource memory usage
+
+In Upbound's testing, memory usage isn't influenced a lot by the number of managed resources under management. Memory usage only goes up slightly by 100 MB when going from 100 to 1000 resource instances under management of a control plane. Hence, for simplicity, you don't need to account for an increase in memory usage on this axis of the control plane.
+
+#### Provider memory usage
+
+When you install a Crossplane provider on a control plane, memory gets consumed
+according to the number of custom resources it defines. Upbound [Official Provider families][official-provider-families] provide higher fidelity control
+to platform teams to install providers for only the resources they need,
+reducing the bloat of needlessly installing unused custom resources. Still, you
+must factor provider memory usage into your calculations to ensure you've
+rightsized the memory available in your Spaces cluster.
+
+
+:::important
+Be careful not to conflate `managed resource` with `custom resource definition`.
+The former is an "instance" of an external resource in Crossplane, while the
+latter defines the API schema of that resource.
+:::
+
+It's estimated that each custom resource definition consumes ~3 MB of memory.
+The calculation is:
+
+```bash
+number_of_managed_resources_defined_in_provider x 3 MB = memory_required
+```
+
+For example, if you plan to use [provider-aws-ec2][provider-aws-ec2], [provider-aws-s3][provider-aws-s3], and [provider-aws-iam][provider-aws-iam], the resulting calculation is:
+
+```bash
+provider-aws-ec2: 98 x 3 MB = 294 MB
+provider-aws-s3: 23 x 3 MB = 69 MB
+provider-aws-iam 22 x 3 MB = 66 MB
+---
+total memory: 429 MB
+```
+
+In this scenario, you should budget ~430 MB of memory for provider usage on this control plane.
+
+:::tip
+Do this calculation for each provider you plan to install on your control plane.
+Then do this calculation for each control plane you plan to run in your Space.
+:::
+
+
+#### Total memory usage
+
+Add the memory usage from the previous sections. Given the preceding examples,
+they result in a recommendation to budget ~1 GB memory for each control plane
+you plan to run in the Space.
+
+:::important
+
+The 1 GB recommendation is an example.
+You should input your own provider requirements to arrive at a final number for
+your own deployment.
+
+:::
+
+### CPU considerations
+
+#### Managed resource CPU usage
+
+The number of managed resources under management by a control plane is the largest contributing factor for CPU usage in a Space. CPU usage scales linearly according to the number of managed resources under management by your control plane. In Upbound's testing, CPU usage requirements _does_ vary from provider to provider. Using the Upbound Official Provider families as a baseline:
+
+
+| Provider | MR create operation (CPU core seconds) | MR update or reconciliation operation (CPU core seconds) |
+| ---- | ---- | ---- |
+| provider-family-aws | 10 | 2 to 3 |
+| provider-family-gcp | 7 | 1.5 |
+| provider-family-azure | 7 to 10 | 1.5 to 3 |
+
+
+When resources are in a non-ready state, Crossplane providers reconcile often (as fast as every 15 seconds). Once a resource reaches `READY`, each Crossplane provider defaults to a 10 minute poll interval. Given this, a 16-core machine has `16x10x60 = 9600` CPU core seconds available. Interpreting this table:
+
+- A single control plane that needs to create 100 AWS MRs concurrently would consume 1000 CPU core seconds, or about 1.5 cores.
+- A single control plane that continuously reconciles 100 AWS MRs once they've reached a `READY` state would consume 300 CPU core seconds, or a little under half a core.
+
+Since `provider-family-aws` has the highest recorded numbers for CPU time required, you can use that as an upper limit in your calculations.
+
+Using these calculations and extrapolating values, given a 16 core machine, it's recommended you don't exceed a single control plane managing 1000 MRs. Suppose you plan to run 10 control planes, each managing 1000 MRs. You want to make sure your node pool has capacity for 160 cores. If you are using a machine type that has 16 cores per machine, that would mean having a node pool of size 10. If you are using a machine type that has 32 cores per machine, that would mean having a node pool of size 5.
+
+#### Cloud API latency
+
+Oftentimes, you are using Crossplane providers to talk to external cloud APIs. Those external cloud APIs often have global API rate limits (examples: [Azure limits][azure-limits], [AWS EC2 limits][aws-ec2-limits]).
+
+For Crossplane providers built on [Upjet][upjet] (such as Upbound Official Provider families), these providers use Terraform under the covers. They expose some knobs (such as `--max-reconcile-rate`) you can use to tweak reconciliation rates.
+
+### Resource buffers
+
+The guidance in the preceding sections explains how to calculate CPU and memory usage requirements for:
+
+- a set of control planes in a Space
+- tuned to the number of providers you plan to use
+- according to the number of managed resource instances you plan to have managed by your control planes
+
+Upbound recommends budgeting an extra buffer of 20% to your resource capacity calculations. The numbers shared in the preceding sections don't account for peaks or surges since they're based off average measurements. Upbound recommends budgeting this buffer to account for these things.
+
+## Deploying more than one Space
+
+You are welcome to deploy more than one Space. You just need to make sure you have a 1:1 mapping of Space to Kubernetes clusters. Spaces are by their nature constrained to a single Kubernetes Cluster, which are regional entities. If you want to offer control planes in multiple cloud environments or multiple public clouds entirely, these are justifications for deploying >1 Spaces.
+
+## Cert-manager
+
+A Spaces deployment uses the [Certificate Custom Resource] from cert-manager to
+provision certificates within the Space. This establishes a nice API boundary
+between what your platform may need and the Certificate requirements of a
+Space.
+
+
+In the event you would like more control over the issuing Certificate Authority
+for your deployment or the deployment of cert-manager itself, this guide is for
+you.
+
+
+### Deploying
+
+An Upbound Space deployment doesn't have any special requirements for the
+cert-manager deployment itself. The only expectation is that cert-manager and
+the corresponding Custom Resources exist in the cluster.
+
+You should be free to install cert-manager in the cluster in any way that makes
+sense for your organization. You can find some [installation ideas] in the
+cert-manager docs.
+
+### Issuers
+
+A default Upbound Space install includes a [ClusterIssuer]. This `ClusterIssuer`
+is a `selfSigned` issuer that other certificates are minted from. You have a
+couple of options available to you for changing the default deployment of the
+Issuer:
+1. Changing the issuer name.
+2. Providing your own ClusterIssuer.
+
+
+#### Changing the issuer name
+
+The `ClusterIssuer` name is controlled by the `certificates.space.clusterIssuer`
+Helm property. You can adjust this during installation by providing the
+following parameter (assuming your new name is 'SpaceClusterIssuer'):
+```shell
+--set "certificates.space.clusterIssuer=SpaceClusterIssuer"
+```
+
+
+
+#### Providing your own ClusterIssuer
+
+To provide your own `ClusterIssuer`, you need to first setup your own
+`ClusterIssuer` in the cluster. The cert-manager docs have a variety of options
+for providing your own. See the [Issuer Configuration] docs for more details.
+
+Once you have your own `ClusterIssuer` set up in the cluster, you need to turn
+off the deployment of the `ClusterIssuer` included in the Spaces deployment.
+To do that, provide the following parameter during installation:
+```shell
+--set "certificates.provision=false"
+```
+
+###### Considerations
+If your `ClusterIssuer` has a name that's different from the default name that
+the Spaces installation expects ('spaces-selfsigned'), you need to also specify
+your `ClusterIssuer` name during install using:
+```shell
+--set "certificates.space.clusterIssuer="
+```
+
+## Exposing spaces externally
+
+To route requests from external clients (kubectl, ArgoCD, etc.) to control planes, you must expose the spaces-router. Options include a LoadBalancer Service (recommended), Gateway API, or Ingress. See [Exposing Spaces externally][expose] for configuration and setup.
+
+[cert-manager]: https://cert-manager.io/
+[Certificate Custom Resource]: https://cert-manager.io/docs/usage/certificate/
+[ClusterIssuer]: https://cert-manager.io/docs/concepts/issuer/
+[installation ideas]: https://cert-manager.io/docs/installation/
+[Issuer Configuration]: https://cert-manager.io/docs/configuration/
+[official-provider-families]: /manuals/packages/providers/provider-families
+[aws-eks]: https://aws.amazon.com/eks/
+[google-cloud-gke]: https://cloud.google.com/kubernetes-engine
+[microsoft-aks]: https://azure.microsoft.com/en-us/products/kubernetes-service
+[upbound-account]: https://www.upbound.io/register/?utm_source=docs&utm_medium=cta&utm_campaign=docs_spaces
+[provider-aws-ec2]: https://marketplace.upbound.io/providers/upbound/provider-aws-ec2
+[provider-aws-s3]: https://marketplace.upbound.io/providers/upbound/provider-aws-s3
+[provider-aws-iam]: https://marketplace.upbound.io/providers/upbound/provider-aws-iam
+[azure-limits]: https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/request-limits-and-throttling
+[aws-ec2-limits]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/throttling.html#throttling-limits-rate-based
+[upjet]: https://github.com/upbound/upjet
+[expose]: /self-hosted-spaces/howtos/ingress/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/dr.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/dr.md
new file mode 100644
index 00000000..bf68cd70
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/dr.md
@@ -0,0 +1,412 @@
+---
+title: Disaster Recovery
+sidebar_position: 13
+description: Configure Space-wide backups for disaster recovery.
+---
+
+:::info API Version Information
+This guide applies to **Spaces v1.9.0 and later** (Self-Hosted only). Space Backups is a alpha feature enabled by default starting in v1.14.0.
+
+- **v1.9.0-v1.13.x**: Alpha feature (requires manual enablement)
+- **v1.14.0+**: GA (enabled by default)
+
+For control-plane backups, see [Backup and Restore](./backup-and-restore.md).
+:::
+
+:::important
+For Connected and Disconnected Spaces, this feature requires Spaces `v1.9.0` and, starting with `v1.14.0`, Spaces enables it by default.
+
+To enable it on versions earlier than `v1.14.0`, set features.alpha.spaceBackup.enabled=true when you install Spaces.
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "features.alpha.spaceBackup.enabled=true"
+```
+:::
+
+Upbound's _Space Backups_ is a built-in Space-wide backup and restore feature. This guide explains how to configure Space Backups and how to restore from one of them in case of disaster recovery.
+
+This feature for Space administrators. Group or Control Plane users can leverage [Shared Backups][shared-backups] to backup and restore their ControlPlanes.
+
+## Benefits
+The Space Backups feature provides the following benefits:
+
+* Automatic backups for all resources in a Space and all resources in control planes, without any operational overhead.
+* Backup schedules.
+* Selectors to specify resources to backup.
+
+## Prerequisites
+
+Enabled the Space Backups feature in the Space:
+
+- Cloud Spaces: Not accessible to users.
+- Connected Spaces: Space administrator must enable this feature.
+- Disconnected Spaces: Space administrator must enable this feature.
+
+## Configure a Space Backup Config
+
+[SpaceBackupConfig][spacebackupconfig] is a cluster-scoped resource. This resource configures the storage details and provider. Whenever a backup executes (either by schedule or manually initiated), it references a SpaceBackupConfig to tell it where store the snapshot.
+
+
+### Backup config provider
+
+
+The `spec.objectStorage.provider` and `spec.objectStorage.config` fields configures:
+
+* The object storage provider
+* The path to the provider
+* The credentials needed to communicate with the provider
+
+You can only set one provider. Upbound currently supports AWS, Azure, and GCP as providers.
+
+
+`spec.objectStorage.config` is a freeform map of configuration options for the object storage provider. See [Thanos object storage][thanos-object-storage] for more information on the formats for each supported cloud provider. `spec.bucket` and `spec.provider` overrides the required values in the config.
+
+
+#### AWS as a storage provider
+
+This example demonstrates how to use AWS as a storage provider for your backups:
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupConfig
+metadata:
+ name: default
+spec:
+ objectStorage:
+ provider: AWS
+ bucket: spaces-backup-bucket
+ config:
+ endpoint: s3.eu-west-2.amazonaws.com
+ region: eu-west-2
+ credentials:
+ source: Secret
+ secretRef:
+ name: bucket-creds
+ namespace: upbound-system
+ key: creds
+```
+
+This example assumes you've already created an S3 bucket called
+`spaces-backup-bucket` in the `eu-west-2` AWS region. To access the bucket,
+define the account credentials as a Secret in the specified Namespace
+(`upbound-system` in this example).
+
+#### Azure as a storage provider
+
+This example demonstrates how to use Azure as a storage provider for your backups:
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupConfig
+metadata:
+ name: default
+ namespace: default
+spec:
+ objectStorage:
+ provider: Azure
+ bucket: upbound-backups
+ config:
+ storage_account: upbackupstore
+ container: upbound-backups
+ endpoint: blob.core.windows.net
+ credentials:
+ source: Secret
+ secretRef:
+ name: bucket-creds
+ namespace: upbound-system
+ key: creds
+```
+
+
+This example assumes you've already created an Azure storage account called
+`upbackupstore` and blob `upbound-backups`. To access the blob,
+define the account credentials as a Secret in the specified Namespace
+(`upbound-system` in this example).
+
+
+#### GCP as a storage provider
+
+This example demonstrates how to use Google Cloud Storage as a storage provider for your backups:
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupConfig
+metadata:
+ name: default
+ namespace: default
+spec:
+ objectStorage:
+ provider: GCP
+ bucket: spaces-backup-bucket
+ credentials:
+ source: Secret
+ secretRef:
+ name: bucket-creds
+ namespace: upbound-system
+ key: creds
+```
+
+
+This example assumes you've already created a Cloud bucket called
+"spaces-backup-bucket" and a service account with access to this bucket. Define the key file as a Secret in the specified Namespace
+(`upbound-system` in this example).
+
+
+## Configure a Space Backup Schedule
+
+
+[SpaceBackupSchedule][spacebackupschedule] is a cluster-scoped resource. This resource defines a backup schedule for the whole Space.
+
+Below is an example of a Space Backup Schedule running every day. It backs up all groups having `environment: production` labels and all control planes in those groups having `backup: please` labels.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupSchedule
+metadata:
+ name: daily-schedule
+spec:
+ schedule: "@daily"
+ configRef:
+ kind: SpaceBackupConfig
+ name: default
+ match:
+ groups:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+ controlPlanes:
+ labelSelectors:
+ - matchLabels:
+ backup: please
+```
+
+### Define a schedule
+
+The `spec.schedule` field is a [Cron-formatted][cron-formatted] string. Some common examples are below:
+
+| Entry | Description |
+| ----------------- | ------------------------------------------------------------------------------------------------- |
+| `@hourly` | Run once an hour. |
+| `@daily` | Run once a day. |
+| `@weekly` | Run once a week. |
+| `0 0/4 * * *` | Run every 4 hours. |
+| `0/15 * * * 1-5` | Run every fifteenth minute on Monday through Friday. |
+| `@every 1h30m10s` | Run every 1 hour, 30 minutes, and 10 seconds. Hour is the largest measurement of time for @every. |
+
+### Suspend a schedule
+
+Use `spec.suspend` field to suspend the schedule. It creates no new backups, but allows running backups to complete.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupSchedule
+metadata:
+ name: daily-schedule
+spec:
+ suspend: true
+...
+```
+
+### Garbage collect backups when the schedule gets deleted
+
+Set the `spec.useOwnerReferencesInBackup` to garbage collect associated `SpaceBackup` when a `SpaceBackupSchedule` gets deleted. If set to true, backups are garbage collected when the schedule gets deleted.
+
+### Set the time to live
+
+Set the `spec.ttl` field to define the time to live for the backup. After this time, the backup is eligible for garbage collection. If this field isn't set, the backup isn't garbage collected.
+
+The time to live is a duration, for example, `168h` for 7 days.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackupSchedule
+metadata:
+ name: daily-schedule
+spec:
+ ttl: 168h # Backup is garbage collected after 7 days
+...
+```
+
+## Selecting space resources to backup
+
+By default, a SpaceBackup selects all groups and, for each of them, all control planes, secrets, and any other group-scoped resources.
+
+By setting `spec.match`, you can include only specific groups, control planes, secrets, or other Space resources in the backup.
+
+By setting `spec.exclude`, you can filter out some matched Space API resources from the backup.
+
+### Including space resources in a backup
+
+Different fields are available to include resources based on labels or names:
+- `spec.match.groups` to include only some groups in the backup.
+- `spec.match.controlPlanes` to include only some control planes in the backup.
+- `spec.match.secrets` to include only some secrets in the backup.
+- `spec.match.extras` to include only some extra resources in the backup.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackup
+metadata:
+ name: my-backup
+spec:
+ configRef:
+ kind: SpaceBackupConfig
+ name: default
+ match:
+ groups:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+ controlPlanes:
+ labelSelectors:
+ - matchLabels:
+ backup: please
+ secrets:
+ names:
+ - my-secret
+ extras:
+ - apiGroup: "spaces.upbound.io"
+ kind: "SharedBackupConfig"
+ names:
+ - my-shared-backup
+```
+
+### Excluding Space resources from the backup
+
+Use the `spec.exclude` field to exclude matched Space API resources from the backup.
+
+Different fields are available to exclude resources based on labels or names:
+- `spec.exclude.groups` to exclude some groups from the backup.
+- `spec.exclude.controlPlanes` to exclude some control planes from the backup.
+- `spec.exclude.secrets` to exclude some secrets from the backup.
+- `spec.exclude.extras` to exclude some extra resources from the backup.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackup
+metadata:
+ name: my-backup
+spec:
+ ttl: 168h # Backup is garbage collected after 7 days
+ configRef:
+ kind: SpaceBackupConfig
+ name: default
+ match:
+ groups:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+ exclude:
+ groups:
+ names:
+ - not-this-one-please
+```
+
+### Exclude resources in control planes' backups
+
+By default, it backs up all resources in a selected control plane.
+
+Use the `spec.controlPlaneBackups.excludedResources` field to exclude resources from control planes' backups.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackup
+metadata:
+ name: my-backup
+spec:
+ ttl: 168h # Backup is garbage collected after 7 days
+ configRef:
+ kind: SpaceBackupConfig
+ name: default
+ controlPlaneBackups:
+ excludedResources:
+ - secrets
+ - buckets.s3.aws.upbound.io
+```
+
+## Create a manual backup
+
+[SpaceBackup][spacebackup] is a cluster-scoped resource that causes a single backup to occur for the whole Space.
+
+Below is an example of a manual SpaceBackup:
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackup
+metadata:
+ name: my-backup
+spec:
+ configRef:
+ kind: SpaceBackupConfig
+ name: default
+ deletionPolicy: Delete
+```
+
+
+The backup specification `DeletionPolicy` defines backup deletion actions,
+including the deletion of the backup file from the bucket. The `Deletion Policy`
+value defaults to `Orphan`. Set it to `Delete` to remove uploaded files
+in the bucket.
+For more information on the backup and restore process, review the [Spaces API documentation][spaces-api-documentation].
+
+### Set the time to live
+
+Set the `spec.ttl` field to define the time to live for the backup. After this time, the backup is eligible for garbage collection. If this field isn't set, the backup isn't garbage collected. The time to live is a duration, for example, `168h` for 7 days.
+
+```yaml
+apiVersion: admin.spaces.upbound.io/v1alpha1
+kind: SpaceBackup
+metadata:
+ name: my-backup
+spec:
+ ttl: 168h # Backup is garbage collected after 7 days
+...
+```
+
+## Restore from a space backup
+
+Space Backup and Restore focuses only on disaster recovery. The restore procedure assumes a new Space installation with no existing resources. The restore procedure is idempotent, so you can run it multiple times without any side effects in case of failures.
+
+To restore a Space from an existing Space Backup, follow these steps:
+
+1. Install Spaces from scratch as needed.
+2. Create a `SpaceBackupConfig` as needed to access the SpaceBackup from the object storage, for example named `my-backup-config`.
+3. Select the backup you want to restore from, for example `my-backup`.
+4. Run the following command to restore the Space:
+
+```shell
+export SPACE_BACKUP_CONFIG=my-backup-config
+export SPACE_BACKUP=my-backup
+kubectl exec -ti -n upbound-system deployments/spaces-controller -c spaces -- hyperspace restore $SPACE_BACKUP $SPACE_BACKUP_CONFIG
+```
+
+### Restore specific control planes
+
+:::important
+This feature is available from Spaces v1.11.
+:::
+
+Instead of restoring the whole Space, you can choose to restore specific control planes
+from a backup using the `--controlplanes` flag. You can also use
+the `--skip-space-restore` flag to skip restoring Space objects.
+This allows Spaces admins to restore individual control planes without
+needing to restore the entire Space.
+
+```shell
+export SPACE_BACKUP_CONFIG=my-backup-config
+export SPACE_BACKUP=my-backup
+kubectl exec -ti -n upbound-system deployments/spaces-controller -c spaces
+-- hyperspace restore $SPACE_BACKUP $SPACE_BACKUP_CONFIG --controlplanes default/ctp1,default/ctp2 --skip-space-restore
+```
+
+
+[shared-backups]: /self-hosted-spaces/howtos/workload-id/backup-restore-config/
+[spacebackupconfig]: /self-hosted-spaces/reference/
+[thanos-object-storage]: https://thanos.io/tip/thanos/storage.md/
+[spacebackupschedule]: /self-hosted-spaces/reference/
+[cron-formatted]: https://en.wikipedia.org/wiki/Cron
+[spacebackup]: /self-hosted-spaces/reference/
+[spaces-api-documentation]: /self-hosted-spaces/reference/
+
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/gitops.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/gitops.md
new file mode 100644
index 00000000..e0b46237
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/gitops.md
@@ -0,0 +1,142 @@
+---
+title: GitOps with ArgoCD in Self-Hosted Spaces
+sidebar_position: 80
+description: Set up GitOps workflows with Argo CD in self-hosted Spaces
+plan: "business"
+---
+
+:::info Deployment Model
+This guide applies to **self-hosted Spaces** deployments. For Upbound Cloud Spaces, see [GitOps with Upbound Control Planes](/cloud-spaces/howtos/gitops-on-upbound/).
+:::
+
+GitOps is an approach for managing a system by declaratively describing desired resources' configurations in Git and using controllers to realize the desired state. Upbound's control planes are compatible with this pattern and it's strongly recommended you integrate GitOps in the platforms you build on Upbound.
+
+
+## Integrate with Argo CD
+
+
+[Argo CD][argo-cd] is a project in the Kubernetes ecosystem commonly used for
+GitOps. You can use it in tandem with Upbound control planes to achieve GitOps
+flows. The sections below explain how to integrate these tools with Upbound.
+
+### Configure connection secrets for control planes
+
+You can configure control planes to write their connection details to a secret.
+Do this by setting the
+[`spec.writeConnectionSecretToRef`][spec-writeconnectionsecrettoref] field in a
+control plane manifest. For example:
+
+```yaml
+apiVersion: spaces.upbound.io/v1beta1
+kind: ControlPlane
+metadata:
+ name: ctp1
+ namespace: default
+spec:
+ writeConnectionSecretToRef:
+ name: kubeconfig-ctp1
+ namespace: default
+```
+
+
+### Configure Argo CD
+
+
+To configure Argo CD for Annotation resource tracking, edit the Argo CD
+ConfigMap in the Argo CD namespace. Add `application.resourceTrackingMethod:
+annotation` to the data section as below.
+
+Next, configure the [auto respect RBAC for the Argo CD
+controller][auto-respect-rbac-for-the-argo-cd-controller-1]. By default, Argo CD
+attempts to discover some Kubernetes resource types that don't exist in a
+control plane. You must configure Argo CD to respect the cluster's RBAC rules so
+that Argo CD can sync. Add `resource.respectRBAC: normal` to the data section as
+below.
+
+```bash
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: argocd-cm
+data:
+ ...
+ application.resourceTrackingMethod: annotation
+ resource.respectRBAC: normal
+```
+
+:::tip
+The `resource.respectRBAC` configuration above tells Argo to respect RBAC for
+_all_ cluster contexts. If you're using an Argo CD instance to manage more than
+control planes, change the `clusters` string match to apply only to control
+planes. For example, if every control plane context name follows the
+`controlplane-` naming convention, you should set the string match to be
+`controlplane-*`.
+:::
+
+
+### Create a cluster context definition
+
+
+Once the control plane is ready, extract the following values from the secret
+containing the kubeconfig:
+
+```bash
+kubeconfig_content=$(kubectl get secrets kubeconfig-ctp1 -n default -o jsonpath='{.data.kubeconfig}' | base64 -d)
+server=$(echo "$kubeconfig_content" | grep 'server:' | awk '{print $2}')
+bearer_token=$(echo "$kubeconfig_content" | grep 'token:' | awk '{print $2}')
+ca_data=$(echo "$kubeconfig_content" | grep 'certificate-authority-data:' | awk '{print $2}')
+```
+
+Generate a new secret in the cluster where you installed Argo, using the prior
+values extracted:
+
+```yaml
+cat <
+
+## Enable Kubernetes Hub authorization
+
+To enable Kubernetes Hub Authentication in your Space, you need:
+- A Kubernetes cluster with RBAC enabled
+- `authorization.hubRBAC` set to `true` (enabled by default)
+
+Users can authenticate to the single-tenant Space with their Kubernetes credentials using this method.
+
+## Configure Kubernetes RBAC
+
+To configure Kubernetes RBAC in your Disconnected Space, you need to create `ClusterRoles` and `Roles` for defining access to your resources. For example:
+
+```yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: controlplane-getter
+rules:
+- apiGroups: ["spaces.upbound.io"]
+ resources: ["controlplanes"]
+ verbs: ["get", "list", "watch"]
+```
+
+Next, create `ClusterRoleBindings` and `RoleBindings` to assign roles to subjects like users, groups, or service accounts:
+
+```yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: controlplane-getters
+subjects:
+- kind: User
+ name: upbound:(user|robot):
+ apiGroup: rbac.authorization.k8s.io
+roleRef:
+ kind: ClusterRole
+ name: controlplane-getter
+ apiGroup: rbac.authorization.k8s.io
+```
+
+The `subject` in this example can contain teams (`upbound:team:`) or org roles (`upbound:org-role:admin|member`) depending on your role needs.
+
+## Upbound RBAC integration
+
+
+
+
+You can use the special verbs `admin`, `edit` and `view` for giving a subject access to a control plane:
+```yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: controlplane-editor
+rules:
+- apiGroups: ["spaces.upbound.io"]
+ resources: ["controlplanes/k8s"]
+ verbs: ["edit"] # or "admin" or "view", depending on access level
+```
+
+
+
+[upbound-rbac]: /manuals/platform/rbac
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress-nginx-migration.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress-nginx-migration.md
new file mode 100644
index 00000000..be707aee
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress-nginx-migration.md
@@ -0,0 +1,764 @@
+---
+title: Migrate away from ingress-nginx
+sidebar_position: 7
+description: A guide on how to migrate from ingress-nginx
+tier: "business"
+---
+
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+`ingress-nginx` is deprecated and will reach end-of-life in March 2026. This
+guide covers migration options for existing Spaces deployments.
+
+For help choosing an exposure method, see [Exposing Spaces Externally][expose].
+Options vary by Spaces version. Select your Spaces version:
+
+* [Upgrading to Spaces 1.16+](#upgrading-to-spaces-116)
+* [Staying on Spaces 1.15 or earlier](#migrate-while-on-spaces-115-or-earlier)
+
+
+## Prerequisites
+
+
+Set environment variables used throughout this guide:
+
+```bash
+export SPACES_VERSION= # Example: 1.16.0
+export SPACES_ROUTER_HOST= # Example: proxy.example.com
+```
+
+Export your current Helm values to a file (or use an existing version-controlled
+file):
+
+```bash
+helm get values spaces -n upbound-system -o yaml > values.yaml
+```
+
+You'll merge new configuration into this file throughout the migration.
+
+## Upgrading to Spaces 1.16+
+
+Choose your migration option:
+
+| Option | When to use |
+|--------|-------------|
+| [LoadBalancer Service](#loadbalancer-service-recommended) | Simplest setup, no additional components needed |
+| [Gateway API](#gateway-api) | Already using Gateway API or need shared gateway |
+| [Alternative ingress controller](#alternative-ingress-controller) | Already using Ingress, or need shared load balancer |
+
+All paths follow the same process: upgrade to 1.16+, switch exposure method,
+then uninstall ingress-nginx.
+
+
+### Upgrade to 1.16+ with Updated Ingress Values
+
+Spaces doesn't provision the Ingress resource by default and is now
+controller-agnostic.
+
+Add the following to your `values.yaml` to keep ingress-nginx working:
+
+```yaml
+ingress:
+ provision: true
+ host: proxy.example.com # Replace with your existing hostname
+ ingressClassName: nginx
+ annotations:
+ nginx.ingress.kubernetes.io/ssl-passthrough: "true"
+ nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
+ podLabels:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/component: controller
+ namespaceLabels:
+ kubernetes.io/metadata.name: ingress-nginx
+```
+
+Upgrade Spaces to 1.16+:
+
+```bash
+helm upgrade spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version ${SPACES_VERSION} \
+ --namespace upbound-system \
+ -f values.yaml \
+ --wait
+```
+
+Verify ingress-nginx is still working before you continue.
+
+### LoadBalancer Service (Recommended)
+
+This section describes how to expose the `spaces-router` with a LoadBalancer
+Service.
+
+:::important
+Use a Network Load Balancer (L4), not an Application Load Balancer (L7). Spaces
+uses long-lived connections for watch traffic that L7 load balancers may
+timeout.
+:::
+
+**1. Add the LoadBalancer Service configuration to your `values.yaml`**
+
+Add the configuration for your cloud:
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Must match your current router hostname
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ service.beta.kubernetes.io/aws-load-balancer-type: external
+ service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip
+```
+
+
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Must match your current router hostname
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ cloud.google.com/l4-rbs: enabled
+```
+
+
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Must match your current router hostname
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations: {}
+```
+
+
+
+**2. Upgrade Spaces (Ingress stays running during transition)**
+
+```bash
+helm upgrade spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version ${SPACES_VERSION} \
+ --namespace upbound-system \
+ -f values.yaml \
+ --wait
+```
+
+**3. Get the new LoadBalancer address**
+
+```bash
+kubectl get svc -n upbound-system spaces-router \
+ -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
+```
+
+**4. Validate before switching DNS**
+
+```bash
+# Get spaces-router load balancer address
+ROUTER_LB=$(kubectl get svc -n upbound-system spaces-router -o jsonpath='{.status.loadBalancer.ingress[0].hostname}')
+
+# Test connectivity using --connect-to to route to the new LB
+curl --connect-to "${SPACES_ROUTER_HOST}:443:${ROUTER_LB}:443" "https://${SPACES_ROUTER_HOST}/version"
+# Expected: 401 Unauthorized (routing works, auth required)
+```
+
+**5. Update your DNS record to point to the new LoadBalancer address**
+
+**6. Update your `values.yaml` to disable Ingress, then upgrade Spaces**
+
+```yaml
+ingress:
+ provision: false
+```
+
+```bash
+helm upgrade spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version ${SPACES_VERSION} \
+ --namespace upbound-system \
+ -f values.yaml \
+ --wait
+```
+
+**7. Uninstall ingress-nginx**
+
+```bash
+helm uninstall ingress-nginx --namespace ingress-nginx
+```
+
+### Gateway API
+
+Spaces supports the [Gateway API][gateway-api] as an alternative to Ingress. Gateway API is the
+Kubernetes standard for traffic routing going forward.
+
+
+**1. Install Envoy Gateway**
+
+```bash
+helm install eg oci://docker.io/envoyproxy/gateway-helm \
+ --namespace envoy-gateway-system \
+ --create-namespace \
+ --wait
+```
+
+See [Envoy Gateway installation docs][envoy-install] for more detailed instructions.
+
+**2. Create EnvoyProxy and GatewayClass**
+
+Create an `EnvoyProxy` resource that the GatewayClass references. See the [Envoy
+Gateway EnvoyProxy docs][envoy-proxy] for the full API and more examples.
+
+
+
+```bash
+kubectl apply -f - <
+
+
+
+```bash
+kubectl apply -f - <
+
+
+
+```bash
+kubectl apply -f - <
+
+Then create the `GatewayClass` that references this EnvoyProxy:
+
+```bash
+kubectl apply -f - --server-side <
+ annotations:
+ # Add your controller's TLS passthrough annotations
+ podLabels:
+ # Labels matching your controller's pods
+ namespaceLabels:
+ # Labels matching your controller's namespace
+```
+
+**3. Upgrade Spaces**
+
+```bash
+helm upgrade spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version ${SPACES_VERSION} \
+ --namespace upbound-system \
+ -f values.yaml \
+ --wait
+```
+
+**4. Get the new load balancer address**
+
+```bash
+kubectl get svc -n -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
+```
+
+**5. Validate before switching DNS**
+
+Test connectivity using `--connect-to` so traffic reaches the new controller
+before you change DNS:
+
+```bash
+CONTROLLER_LB=$(kubectl get svc -n -o jsonpath='{.status.loadBalancer.ingress[0].hostname}')
+curl --connect-to "${SPACES_ROUTER_HOST}:443:${CONTROLLER_LB}:443" "https://${SPACES_ROUTER_HOST}/version"
+# Expected: 401 Unauthorized (routing works, auth required)
+```
+
+**6. Update your DNS record** to point to the new load balancer address.
+
+**7. Uninstall ingress-nginx**
+
+```bash
+helm uninstall ingress-nginx --namespace ingress-nginx
+```
+
+
+## Migrate while on Spaces 1.15 or earlier
+
+
+Choose your migration option:
+
+| Option | When to use |
+|--------|-------------|
+| [Gateway API](#gateway-api-spaces-110) | Already using Gateway API or need shared gateway |
+| [Traefik](#traefik-or-alternative-ingress-controller) | Migrate from nginx Ingress to alternative controller |
+
+Export your current Helm values to a file (or use your existing values file if
+stored in Git):
+
+```bash
+helm get values spaces -n upbound-system -o yaml > values.yaml
+```
+
+
+### Gateway API (Spaces 1.10+)
+
+
+Gateway API support has been available since Spaces 1.10. See [Gateway API
+Configuration][gateway-api-config] for detailed setup instructions.
+
+:::note
+Pre-1.16 Spaces doesn't support running Ingress and Gateway API
+simultaneously. This migration requires switching over in a single upgrade,
+which causes brief downtime during DNS propagation.
+:::
+
+
+**1. Install a gateway API controller**
+
+Install a Gateway API implementation that supports TLS passthrough and
+`TLSRoute`.
+
+The following example uses Envoy Gateway:
+
+```bash
+export ENVOY_GATEWAY_VERSION= # Example: v1.2.4
+
+helm -n envoy-gateway-system upgrade --install --wait --wait-for-jobs \
+ --timeout 300s --create-namespace envoy-gateway \
+ oci://docker.io/envoyproxy/gateway-helm \
+ --version "${ENVOY_GATEWAY_VERSION}"
+```
+
+**2. Create EnvoyProxy and GatewayClass**
+
+Create an `EnvoyProxy` resource, then the `GatewayClass` that references it.
+
+
+
+```bash
+kubectl apply -f - <
+
+
+
+```bash
+kubectl apply -f - <
+
+
+
+```bash
+kubectl apply -f - <
+
+```bash
+kubectl apply -f - --server-side <
+:::tip
+Configure Traefik's Service with NLB annotations. See
+[Cloud-specific annotations][expose-annotate].
+:::
+
+
+**2. Validate before switching DNS**
+
+```bash
+# Get Traefik load balancer address
+TRAEFIK_LB=$(kubectl get svc -n traefik traefik -o jsonpath='{.status.loadBalancer.ingress[0].hostname}')
+
+# Test connectivity using --connect-to to route to Traefik
+curl --connect-to "${SPACES_ROUTER_HOST}:443:${TRAEFIK_LB}:443" "https://${SPACES_ROUTER_HOST}/version"
+# Expected: 401 Unauthorized (routing works, auth required)
+```
+
+**3. Update DNS to point to Traefik**
+
+```bash
+kubectl get svc -n traefik traefik -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
+```
+
+Update your DNS record to this address. For gradual migration, use weighted DNS routing.
+
+**4. Preserve the nginx IngressClass before uninstalling ingress-nginx**
+
+```bash
+helm upgrade ingress-nginx ingress-nginx \
+ --repo https://kubernetes.github.io/ingress-nginx \
+ --namespace ingress-nginx \
+ --reuse-values \
+ --set-json 'controller.ingressClassResource.annotations={"helm.sh/resource-policy": "keep"}'
+```
+
+**5. Uninstall ingress-nginx**
+
+```bash
+helm uninstall ingress-nginx --namespace ingress-nginx
+```
+
+Keep `ingress.provision: true` so the Spaces chart continues to manage the
+Ingress resource. Traefik picks it up via the nginx provider.
+
+## Verification
+
+After migration, verify connectivity:
+
+```bash
+curl -v "https://${SPACES_ROUTER_HOST}/version"
+# Expected: 401 Unauthorized
+```
+
+If you need to roll back, reinstall ingress-nginx, set `ingress.provision: true`
+(and your previous ingress values) in Helm values, then upgrade Spaces again.
+
+[envoy-install]: https://gateway.envoyproxy.io/docs/install/
+[envoy-proxy]: https://gateway.envoyproxy.io/latest/tasks/operations/customize-envoyproxy/
+[spaces-install]: /self-hosted-spaces/howtos/self-hosted-spaces-deployment/
+[traefik-migrate]: https://doc.traefik.io/traefik/migrate/nginx-to-traefik/
+[spaces-deploy]: /self-hosted-spaces/howtos/self-hosted-spaces-deployment/
+[k8s-announce]: https://www.kubernetes.dev/blog/2025/11/12/ingress-nginx-retirement/
+[expose]: /self-hosted-spaces/howtos/ingress/
+[expose-annotate]: /self-hosted-spaces/howtos/ingress/#cloud-specific-annotations
+[gateway-api]: https://gateway-api.sigs.k8s.io/
+[gateway-api-config]: /self-hosted-spaces/howtos/ingress/#gateway-api
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress.md
new file mode 100644
index 00000000..e51bccb7
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/ingress.md
@@ -0,0 +1,226 @@
+---
+title: Exposing Spaces externally
+sidebar_position: 5
+description: Options for exposing Spaces externally
+---
+
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+You can expose Spaces externally using one of three options:
+
+| Option | When to use |
+|--------|-------------|
+| LoadBalancer Service | Simplest setup, recommended for most deployments |
+| Gateway API | Organization already using Gateway API, or need shared gateway across services |
+| Ingress | Organization already using Ingress, or need shared load balancer across services |
+
+## LoadBalancer Service
+
+
+Upbound recommends a LoadBalancer Service to expose `spaces-router`.
+
+
+:::important
+Use a Network Load Balancer (L4), not an Application Load Balancer (L7). Spaces
+uses long-lived connections for watch traffic that L7 load balancers may
+timeout.
+:::
+
+### Configuration
+
+Add the following to your **Spaces Helm values** (or pass via `--set` when installing or upgrading). Choose the block for your cloud:
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Externally routable hostname for TLS certificates
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ service.beta.kubernetes.io/aws-load-balancer-type: external
+ service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip
+```
+
+
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Externally routable hostname for TLS certificates
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations: {} # Azure uses L4 by default
+```
+
+
+
+
+
+```yaml
+externalTLS:
+ host: proxy.example.com # Externally routable hostname for TLS certificates
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ cloud.google.com/l4-rbs: enabled
+```
+
+
+
+
+### Get the LoadBalancer address
+
+
+After installation:
+
+```bash
+kubectl get svc -n upbound-system spaces-router \
+ -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
+```
+
+Create or update a DNS record pointing your `externalTLS.host` to this address.
+
+## Ingress
+
+Use Ingress if you need to share a load balancer across multiple services or
+have specific networking requirements.
+
+### Requirements
+
+- TLS passthrough support in your Ingress controller
+- Network Load Balancer (L4) strongly recommended for long-lived connections
+
+Configure your Ingress controller's Service with [NLB annotations](#cloud-specific-annotations).
+
+
+### Configuration
+
+Add the following to your **Spaces Helm values** (or pass via `--set` when installing or upgrading):
+
+```yaml
+ingress:
+ provision: true
+ host: proxy.example.com
+ ingressClassName: ""
+ # Annotations to add to the Ingress resource
+ annotations: {}
+ # Pod labels of the Ingress controller - used for network policy
+ podLabels: {}
+ # Namespace labels of the Ingress controller - used for network policy
+ namespaceLabels: {}
+```
+
+### Traefik (with nginx provider)
+
+Traefik can use the [kubernetesIngressNGINX provider][traefik-provider] to
+handle nginx-style Ingress resources with TLS passthrough. Add to your **Spaces Helm values**:
+
+```yaml
+ingress:
+ provision: true
+ host: proxy.example.com
+ ingressClassName: nginx
+ annotations:
+ nginx.ingress.kubernetes.io/ssl-passthrough: "true"
+ nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
+ podLabels:
+ app.kubernetes.io/name: traefik
+ namespaceLabels:
+ kubernetes.io/metadata.name: traefik
+```
+
+## Gateway API
+
+Spaces supports the [Gateway API][gateway-api-docs]. Use this option if your
+organization is already using Gateway API or needs a shared gateway across
+multiple services.
+
+### Requirements
+
+- A Gateway API controller (for example, Envoy Gateway, Cilium, or Traefik)
+- Gateway API CRDs installed in your cluster
+- TLS passthrough support
+- Network Load Balancer (L4) strongly recommended
+
+For step-by-step setup including installing a controller (such as Envoy Gateway) and creating the GatewayClass, see [Migrate away from ingress-nginx - Gateway API][migration-gateway-api].
+
+### Gateway API configuration
+
+Add the following to your **Spaces Helm values** (or use `--set` when upgrading). Disable Ingress when using Gateway API.
+
+```yaml
+gatewayAPI:
+ host: proxy.example.com # Externally routable hostname; must match your DNS
+ gateway:
+ provision: true
+ name: spaces
+ className: spaces # Must match your GatewayClass name
+ spacesRouterRoute:
+ provision: true
+ podLabels:
+ app.kubernetes.io/name: envoy
+ app.kubernetes.io/component: proxy
+ app.kubernetes.io/managed-by: envoy-gateway
+ namespaceLabels:
+ kubernetes.io/metadata.name: envoy-gateway-system
+```
+
+The `podLabels` and `namespaceLabels` must match your Gateway API controller's pods and namespace (for NetworkPolicy). The example above uses Envoy Gateway; adjust for your controller.
+
+Install or upgrade Spaces with these values:
+
+```bash
+helm upgrade spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --namespace upbound-system \
+ -f values.yaml \
+ --wait
+```
+
+### Get the gateway address
+
+After your controller has configured the Gateway:
+
+```bash
+kubectl get gateway -n upbound-system spaces \
+ -o jsonpath='{.status.addresses[0].value}'
+```
+
+Create or update a DNS record so that `gatewayAPI.host` points to this address.
+
+### Troubleshooting
+
+- **Gateway status:** Run `kubectl get gateway -n upbound-system spaces -o yaml`. Look for `Accepted` and `Programmed` in `status.conditions`.
+- **TLSRoute status:** Run `kubectl get tlsroute -n upbound-system spaces-router -o yaml`. The route should show `Accepted: True`.
+- **Connectivity:** Run `curl -k "https:///version"`. Expected response is `401 Unauthorized` (routing works, auth required).
+
+## Cloud-specific annotations
+
+Network Load Balancers (L4) are strongly recommended. Spaces uses long-lived
+watch connections (hours or days) for kubectl and ArgoCD. L7 load balancers may
+timeout these connections. Use these annotations on the LoadBalancer Service
+(spaces-router, Ingress controller, or Gateway).
+
+| Cloud | Annotations |
+|-------|-------------|
+| **AWS** | `service.beta.kubernetes.io/aws-load-balancer-type: external`
`service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing`
`service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip` |
+| **GCP** | `cloud.google.com/l4-rbs: enabled` |
+| **Azure** | None required (L4 by default) |
+
+
+[traefik-provider]: https://doc.traefik.io/traefik/reference/install-configuration/providers/kubernetes/kubernetes-ingress-nginx/
+[gateway-api-docs]: https://gateway-api.sigs.k8s.io/
+[migration-gateway-api]: /self-hosted-spaces/howtos/ingress-nginx-migration/#gateway-api
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-service.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-service.md
new file mode 100644
index 00000000..8c71f77f
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-service.md
@@ -0,0 +1,23 @@
+---
+title: Managed Upbound control planes
+description: "Learn about the managed service capabilities of a Space"
+sidebar_position: 10
+---
+
+Control planes in Upbound are fully isolated [Upbound Crossplane][uxp] instances
+that Upbound manages for you. This means:
+
+- the underlying lifecycle of infrastructure (compute, memory, and storage) required to power your instance.
+- scaling of the infrastructure.
+- the maintenance of the core Upbound Crossplane components that make up a control plane.
+
+This lets users focus on building their APIs and operating their control planes,
+while Upbound handles the rest. Each control plane has its own dedicated API
+server connecting users to their control plane.
+
+## Learn about Upbound control planes
+
+Read the [concept][ctp-concept] documentation to learn about Upbound control planes.
+
+[uxp]: /manuals/uxp/overview
+[ctp-concept]: /self-hosted-spaces/concepts/control-planes
\ No newline at end of file
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-spaces-deployment.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-spaces-deployment.md
new file mode 100644
index 00000000..65dd1c29
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/managed-spaces-deployment.md
@@ -0,0 +1,267 @@
+---
+title: Managed Spaces
+sidebar_position: 4
+description: A guide to Upbound Managed Spaces
+plan: business
+draft: true
+---
+
+
+
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+
+:::important
+This feature is only available for select Business Critical customers. You can't
+set up your own Managed Space without the assistance of Upbound. If you're
+interested in this deployment mode, please [contact us][contact].
+:::
+
+
+
+A Managed Space deployed on AWS is a single-tenant deployment of a control plane
+space in your AWS organization in an isolated sub-account. With Managed Spaces,
+you can use the same API, CLI, and Console that Upbound offers, with the benefit
+of running entirely in a cloud account that you own and Upbound manages for you.
+
+The following guide walks you through setting up a Managed Space in your AWS
+organization. If you have any questions while working through this guide,
+contact your Upbound Account Representative for help.
+
+
+
+
+
+A Managed Space deployed on GCP is a single-tenant deployment of a control plane
+space in your GCP organization in an isolated project. With Managed Spaces, you
+can use the same API, CLI, and Console that Upbound offers, with the benefit of
+running entirely in a cloud account that you own and Upbound manages for you.
+
+The following guide walks you through setting up a Managed Space in your GCP
+organization. If you have any questions while working through this guide,
+contact your Upbound Account Representative for help.
+
+
+
+
+## Managed Space on your cloud architecture
+
+
+
+A Managed Space is a deployment of the Upbound Spaces software inside an
+Upbound-controlled sub-account in your AWS cloud environment. The Spaces
+software runs in this sub-account, orchestrated by Kubernetes. Backups and
+billing data get stored inside bucket or blob storage in the same sub-account.
+The control planes deployed and controlled by the Spaces software runs on the
+Kubernetes cluster which gets deployed into the sub-account.
+
+The diagram below illustrates the high-level architecture of Upbound Managed Spaces:
+
+
+
+The Spaces software gets deployed on an EKS Cluster in the region of your
+choice. This EKS cluster is where your control planes are ultimately run.
+Upbound also deploys buckets, 1 for the collection of the billing data and 1 for
+control plane backups.
+
+Upbound doesn't have access to other sub-accounts nor your organization-level
+settings in your cloud environment. Outside of your cloud organization, Upbound
+runs the Upbound Console, which includes the Upbound API and web application,
+including the dashboard you see at `console.upbound.io`. By default, all
+connections are encrypted, but public. Optionally, you also have the option to
+use private network connectivity through [AWS PrivateLink][aws-privatelink].
+
+
+
+
+
+
+A Managed Space is a deployment of the Upbound Spaces software inside an
+Upbound-controlled project in your GCP cloud environment. The Spaces software
+runs in this project, orchestrated by Kubernetes. Backups and billing data get
+stored inside bucket or blob storage in the same project. The control planes
+deployed and controlled by the Spaces software runs on the Kubernetes cluster
+which gets deployed into the project.
+
+The diagram below illustrates the high-level architecture of Upbound Managed Spaces:
+
+
+
+The Spaces software gets deployed on a GKE Cluster in the region of your choice.
+This GKE cluster is where your control planes are ultimately run. Upbound also
+deploys cloud buckets, 1 for the collection of the billing data and 1 for
+control plane backups.
+
+Upbound doesn't have access to other projects nor your organization-level
+settings in your cloud environment. Outside of your cloud organization, Upbound
+runs the Upbound Console, which includes the Upbound API and web application,
+including the dashboard you see at `console.upbound.io`. By default, all
+connections are encrypted, but public. Optionally, you also have the option to
+use private network connectivity through [GCP Private Service
+Connect][gcp-private-service-connect].
+
+
+
+## Prerequisites
+
+- An organization created on Upbound
+
+
+
+- You should have a preexisting AWS organization to complete this guide.
+- You must create a new AWS sub-account. Read the [AWS documentation][aws-documentation] to learn how to create a new sub-account in an existing organization on AWS.
+
+After the sub-account information gets provided to Upbound, **don't change it
+any further.** Any changes made to the sub-account or the resources created by
+Upbound for the purposes of the Managed Space deployments voids the SLA you have
+with Upbound. If you want to make configuration changes, contact your Upbound
+Solutions Architect.
+
+
+
+
+
+- You should have a preexisting GCP organization with an active Cloud Billing account to complete this guide.
+- You must create a new GCP project. Read the [GCP documentation][gcp-documentation] to learn how to create a new project in an existing organization on GCP.
+
+After the project information gets provided to Upbound, **don't change it any
+further.** Any changes made to the project or the resources created by Upbound
+for the purposes of the Managed Space deployments voids the SLA you have with
+Upbound. If you want to make configuration changes, contact your Upbound
+Solutions Architect.
+
+
+
+
+
+## Set up cross-account management
+
+Upbound supports using AWS Key Management Service with cross-account IAM
+permissions. This enables the isolation of keys so the infrastructure operated
+by Upbound has limited access to symmetric keys.
+
+In the KMS key's account, apply the baseline key policy:
+
+```json
+{
+ "Sid": "Allow Upbound to use this key",
+ "Effect": "Allow",
+ "Principal": {
+ "AWS": ["[Managed Space sub-account ID]"]
+ },
+ "Action": ["kms:Encrypt", "kms:Decrypt", "kms:ReEncrypt*", "kms:GenerateDataKey*", "kms:DescribeKey"],
+ "Resource": "*"
+}
+```
+
+You need another key policy to let the sub-account create persistent resources
+with the KMS key:
+
+```json
+{
+ "Sid": "Allow attachment of persistent resources for an Upbound Managed Space",
+ "Effect": "Allow",
+ "Principal": {
+ "AWS": "[Managed Space sub-account ID]"
+ },
+ "Action": ["kms:CreateGrant", "kms:ListGrants", "kms:RevokeGrant"],
+ "Resource": "*",
+ "Condition": {
+ "Bool": {
+ "kms:GrantIsForAWSResource": "true"
+ }
+ }
+}
+```
+
+### Configure PrivateLink
+
+By default, all connections to the Upbound Console are encrypted, but public.
+AWS PrivateLink is a feature that allows VPC peering whereby your traffic
+doesn't traverse the public internet. To have this configured, contact your
+Upbound Account Representative.
+
+
+
+
+
+## Enable APIs
+
+Enable the following APIs in the new project:
+
+- Kubernetes Engine API
+- Cloud Resource Manager API
+- Compute Engine API
+- Cloud DNS API
+
+:::tip
+Read how to enable APIs in a GCP project [here][here].
+:::
+
+## Create a service account
+
+Create a service account in the new project. Name the service account,
+upbound-sa. Give the service account the following roles:
+
+- Compute Admin
+- Project IAM Admin
+- Service Account Admin
+- DNS Administrator
+- Editor
+
+Select the service account you just created. Select keys. Add a new key and
+select JSON. The key gets downloaded to your machine. Save this for later.
+
+## Create a DNS Zone
+
+Create a DNS Zone, set the **Zone type** to `Public`.
+
+### Configure Private Service Connect
+
+By default, all connections to the Upbound Console are encrypted, but public.
+GCP Private Service Connect is a feature that allows VPC peering whereby your
+traffic doesn't traverse the public internet. To have this configured, contact
+your Upbound Account Representative.
+
+
+
+## Provide information to Upbound
+
+Once these policies get attached to the key, tell your Upbound Account
+Representative, providing them the following:
+
+
+
+- the full ARN of the KMS key.
+- the name of the organization that you created in Upbound. Use the up CLI command, `up org list`, so see this information.
+- Confirmation of which region in AWS you want the deployment to target.
+
+
+
+
+
+- The service account JSON key
+- The NS records associated with the DNS name created in the last step.
+- the name of the organization that you created in Upbound. Use the up CLI command, `up org list`, so see this information.
+- Confirmation of which region in GCP you want the deployment to target.
+
+
+
+Once Upbound has this information, the request gets processed in a business day.
+
+## Use your Managed Space
+
+Once the Managed Space gets deployed, you can see it in the Space selector when browsing your environment on [`console.upbound.io`][console-upbound-io].
+
+
+
+
+[contact]: https://www.upbound.io/contact-us
+[aws-privatelink]: #configure-privatelink
+[aws-documentation]: https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_create.html#orgs_manage_accounts_create-new
+[gcp-private-service-connect]: #configure-private-service-connect
+[gcp-documentation]: https://cloud.google.com/resource-manager/docs/creating-managing-organization
+[here]: https://cloud.google.com/apis/docs/getting-started#enabling_apis
+[console-upbound-io]: https://console.upbound.io/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/mcp-connector-guide.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/mcp-connector-guide.md
new file mode 100644
index 00000000..f7b3906c
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/mcp-connector-guide.md
@@ -0,0 +1,164 @@
+---
+title: Consume control plane APIs in an app cluster with control plane connector
+sidebar_position: 99
+description: A tutorial to configure a Space with Argo to declaratively create and
+ manage control planes
+---
+
+In this tutorial, you learn how to configure a Kubernetes app cluster to communicate with a control plane in an Upbound self-hosted Space.
+
+
+The [control plane connector][control-plane-connector] bridges your Kubernetes application clusters---running outside of Upbound--to your control planes running in Upbound. This allows you to interact with your control plane's API right from the app cluster. The claim APIs you define via `CompositeResourceDefinitions` are available alongside Kubernetes workload APIs like `Pod`. In effect, control plane connector provides the same experience as a locally installed Crossplane.
+
+## Prerequisites
+
+To complete this tutorial, you need the following:
+
+- Have already deployed an Upbound Space.
+- Have already deployed an Kubernetes cluster (referred to as `app cluster`).
+
+## Create a control plane
+
+Create a new control plane in your self-hosted Space. Run the following command in a terminal:
+
+```bash
+up ctp create my-control-plane
+```
+
+Once the control plane is ready, connect to it.
+
+```bash
+up ctx my-control-plane
+```
+
+For convenience, install an Upbound [platform reference Configuration][platform-reference-configuration] from the marketplace. For production scenarios, replace this with your own Crossplane Configurations or compositions.
+
+```bash
+up ctp configuration install xpkg.upbound.io/upbound/platform-ref-aws:v1.4.0
+```
+
+## Fetch the control plane's connection details
+
+Run the following command in a terminal:
+
+```shell
+kubectl get secret kubeconfig-my-control-plane -n default -o jsonpath='{.data.kubeconfig}' | base64 -d > kubeconfig-my-control-plane.yaml
+```
+
+This command saves the kubeconfig for the control plane to a file in your working directory.
+
+## Install control plane connector in your app cluster
+
+Switch contexts to your Kubernetes app cluster. To install the control plane connector in your app cluster, you must first provide a secret containing your control plane's kubeconfig at install-time. Run the following command in a terminal:
+
+:::important
+Run the following commands against your **app cluster**, not your control plane.
+:::
+
+```bash
+kubectl create secret generic kubeconfig-my-control-plane -n kube-system --from-file=kubeconfig=./kubeconfig-my-control-plane.yaml
+```
+
+Set the environment variable below to configure which namespace _in your control plane_ you wish to sync the app cluster's claims to.
+
+```shell
+export CONNECTOR_CTP_NAMESPACE=app-cluster-1
+```
+
+Install the Control Plane Connector in the app cluster and point it to your control plane.
+
+```bash
+up ctp connector install my-control-plane $CONNECTOR_CTP_NAMESPACE --control-plane-secret=kubeconfig-my-control-plane
+```
+
+## Inspect your app cluster
+
+After you install Control Plane Connector in the app cluster, you can now see APIs which live on the control plane. You can confirm this is the case by running the following command on your app cluster:
+
+```bash {copy-lines="1"}
+kubectl api-resources | grep upbound
+
+# The output should look like this:
+sqlinstances aws.platform.upbound.io/v1alpha1 true SQLInstance
+clusters aws.platformref.upbound.io/v1alpha1 true Cluster
+osss observe.platform.upbound.io/v1alpha1 true Oss
+apps platform.upbound.io/v1alpha1 true App
+```
+
+## Claim a database instance on your app cluster
+
+Create a database claim against the `SQLInstance` API and observe resources get created by your control plane. Apply the following resources to your app cluster:
+
+```yaml
+cat < --output
+ ```
+
+ The command exports your existing Crossplane control plane configuration/state into an archive file.
+
+::: note
+By default, the export command doesn't make any changes to your existing Crossplane control plane state, leaving it intact. Use the `--pause-before-export` flag to pause the reconciliation on managed resources before exporting the archive file.
+
+This safety mechanism ensures the control plane you migrate state to doesn't assume ownership of resources before you're ready.
+:::
+
+2. Use the control plane [create command][create-command] to create a managed
+control plane in Upbound:
+
+ ```bash
+ up controlplane create my-controlplane
+ ```
+
+3. Use [`up ctx`][up-ctx] to connect to the control plane created in the previous step:
+
+ ```bash
+ up ctx "///my-controlplane"
+ ```
+
+ The command configures your local `kubeconfig` to connect to the control plane.
+
+4. Run the following command to import the archive file into the control plane:
+
+ ```bash
+ up controlplane migration import --input
+ ```
+
+:::note
+By default, the import command leaves the control plane in an inactive state by pausing the reconciliation on managed
+resources. This pause gives you an opportunity to review the imported configuration/state before activating the control plane.
+Use the `--unpause-after-import` flag to change the default behavior and activate the control plane immediately after
+importing the archive file.
+:::
+
+
+
+5. Review and validate the imported configuration/state. When you are ready, activate your managed
+ control plane by running the following command:
+
+ ```bash
+ kubectl annotate managed --all crossplane.io/paused-
+ ```
+
+ At this point, you can delete the source Crossplane control plane.
+
+## CLI options
+
+### Filtering
+
+The migration tool captures the state of a Control Plane. The only filtering
+supported is Kubernetes namespace and Kubernetes resource Type filtering.
+
+You can exclude namespaces using the `--exclude-namespaces` CLI option. This can prevent the CLI from including unwanted resources in the export.
+
+```bash
+--exclude-namespaces=kube-system,kube-public,kube-node-lease,local-path-storage,...
+
+# A list of specific namespaces to exclude from the export. Defaults to 'kube-system', 'kube-public','kube-node-lease', and 'local-path-storage'.
+```
+
+You can exclude Kubernetes Resource types by using the `--exclude-resources` CLI option:
+
+```bash
+--exclude-resources=EXCLUDE-RESOURCES,...
+
+# A list of resource types to exclude from the export in "resource.group" format. No resources are excluded by default.
+```
+
+For example, here's an example for excluding the CRDs installed by Crossplane functions (since they're not needed):
+
+```bash
+up controlplane migration export \
+ --exclude-resources=gotemplates.gotemplating.fn.crossplane.io,kclinputs.template.fn.crossplane.io
+```
+
+:::warning
+You must specify resource names in lowercase "resource.group" format (for example, `gotemplates.gotemplating.fn.crossplane.io`). Using only the resource kind (for example, `GoTemplate`) isn't supported.
+:::
+
+
+:::tip Function Input CRDs
+
+Exclude function input CRDs (`inputs.template.fn.crossplane.io`, `resources.pt.fn.crossplane.io`, `gotemplates.gotemplating.fn.crossplane.io`, `kclinputs.template.fn.crossplane.io`) from migration exports. Upbound automatically recreates these resources during import. Function input CRDs typically have owner references to function packages and may have restricted RBAC access. Upbound installs these CRDs during the import when function packages are restored.
+
+:::
+
+
+After export, users can also change the archive file to only include necessary resources.
+
+### Export non-Crossplane resources
+
+Use the `--include-extra-resources=` CLI option to select other CRD types to include in the export.
+
+### Set the kubecontext
+
+Currently `--context` isn't supported in the migration CLI. You should be able to use the `--kubeconfig` CLI option to use a file that's set to the correct context. For example:
+
+```bash
+up controlplane migration export --kubeconfig
+```
+
+Use this in tandem with `up ctx` to export a control plane's kubeconfig:
+
+```bash
+up ctx --kubeconfig ~/.kube/config
+
+# To list the current contet
+up ctx . --kubeconfig ~/.kube/config
+```
+
+## Export archive
+
+The migration CLI exports an archive upon successful completion. Below is an example export of a control plane that excludes several CRD types and skips the confirmation prompt. A file gets written to the working directory, unless you select another output file:
+
+
+
+View the example export
+
+```bash
+$ up controlplane migration export --exclude-resources=gotemplates.gotemplating.fn.crossplane.io,kclinputs.template.fn.crossplane.io --yes
+Exporting control plane state...
+✓ Scanning control plane for types to export... 121 types found! 👀
+✓ Exporting 121 Crossplane resources...60 resources exported! 📤
+✓ Exporting 3 native resources...8 resources exported! 📤
+✓ Archiving exported state... archived to "xp-state.tar.gz"! 📦
+```
+
+
+
+
+When an export occurs, a file named `xp-state.tar.gz` by default gets created in the working directory. You can unzip the file and all the contents of the export are all text YAML files.
+
+- Each CRD (for example `vpcs.ec2.aws.upbound.io`) gets its own directory
+which contains:
+ - A `metadata.yaml` file that contains Kubernetes Object Metadata
+ - A list of Kubernetes Categories the resource belongs to
+- A `cluster` directory that contains YAML manifests for all resources provisioned
+using the CRD.
+
+Sample contents for a Cluster with a single `XNetwork` Composite from
+[configuration-aws-network][configuration-aws-network] is show below:
+
+
+
+
+View the example cluster content
+
+```bash
+├── compositionrevisions.apiextensions.crossplane.io
+│ ├── cluster
+│ │ ├── kcl.xnetworks.aws.platform.upbound.io-4ca6a8a.yaml
+│ │ └── xnetworks.aws.platform.upbound.io-9859a34.yaml
+│ └── metadata.yaml
+├── configurations.pkg.crossplane.io
+│ ├── cluster
+│ │ └── configuration-aws-network.yaml
+│ └── metadata.yaml
+├── deploymentruntimeconfigs.pkg.crossplane.io
+│ ├── cluster
+│ │ └── default.yaml
+│ └── metadata.yaml
+├── export.yaml
+├── functions.pkg.crossplane.io
+│ ├── cluster
+│ │ ├── crossplane-contrib-function-auto-ready.yaml
+│ │ ├── crossplane-contrib-function-go-templating.yaml
+│ │ └── crossplane-contrib-function-kcl.yaml
+│ └── metadata.yaml
+├── internetgateways.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-xgl4q.yaml
+│ └── metadata.yaml
+├── mainroutetableassociations.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-t2qh7.yaml
+│ └── metadata.yaml
+├── namespaces
+│ └── cluster
+│ ├── crossplane-system.yaml
+│ ├── default.yaml
+│ └── upbound-system.yaml
+├── providerconfigs.aws.upbound.io
+│ ├── cluster
+│ │ └── default.yaml
+│ └── metadata.yaml
+├── providerconfigusages.aws.upbound.io
+│ ├── cluster
+│ │ ├── 0a2a3ec6-ef13-45f9-9cf0-63af7f4a6b6b.yaml
+...redacted
+│ │ └── f7092b0f-3a78-4bfe-82c8-57e5085a9b11.yaml
+│ └── metadata.yaml
+├── providers.pkg.crossplane.io
+│ ├── cluster
+│ │ ├── upbound-provider-aws-ec2.yaml
+│ │ └── upbound-provider-family-aws.yaml
+│ └── metadata.yaml
+├── routes.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-dt9cj.yaml
+│ └── metadata.yaml
+├── routetableassociations.ec2.aws.upbound.io
+│ ├── cluster
+│ │ ├── borrelli-backup-test-mr2sd.yaml
+│ │ ├── borrelli-backup-test-ngq5h.yaml
+│ │ ├── borrelli-backup-test-nrkgg.yaml
+│ │ └── borrelli-backup-test-wq752.yaml
+│ └── metadata.yaml
+├── routetables.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-dv4mb.yaml
+│ └── metadata.yaml
+├── secrets
+│ └── namespaces
+│ ├── crossplane-system
+│ │ ├── cert-token-signing-gateway-pub.yaml
+│ │ ├── mxp-hostcluster-certs.yaml
+│ │ ├── package-pull-secret.yaml
+│ │ └── xgql-tls.yaml
+│ └── upbound-system
+│ └── aws-creds.yaml
+├── securitygrouprules.ec2.aws.upbound.io
+│ ├── cluster
+│ │ ├── borrelli-backup-test-472f4.yaml
+│ │ └── borrelli-backup-test-qftmw.yaml
+│ └── metadata.yaml
+├── securitygroups.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-w5jch.yaml
+│ └── metadata.yaml
+├── storeconfigs.secrets.crossplane.io
+│ ├── cluster
+│ │ └── default.yaml
+│ └── metadata.yaml
+├── subnets.ec2.aws.upbound.io
+│ ├── cluster
+│ │ ├── borrelli-backup-test-8btj6.yaml
+│ │ ├── borrelli-backup-test-gbmrm.yaml
+│ │ ├── borrelli-backup-test-m7kh7.yaml
+│ │ └── borrelli-backup-test-nttt5.yaml
+│ └── metadata.yaml
+├── vpcs.ec2.aws.upbound.io
+│ ├── cluster
+│ │ └── borrelli-backup-test-7hwgh.yaml
+│ └── metadata.yaml
+└── xnetworks.aws.platform.upbound.io
+├── cluster
+│ └── borrelli-backup-test.yaml
+└── metadata.yaml
+43 directories, 87 files
+```
+
+
+
+
+The `export.yaml` file contains metadata about the export, including the configuration of the export, Crossplane information, and what's included in the export bundle.
+
+
+
+View the export
+
+```yaml
+version: v1alpha1
+exportedAt: 2025-01-06T17:39:53.173222Z
+options:
+ excludedNamespaces:
+ - kube-system
+ - kube-public
+ - kube-node-lease
+ - local-path-storage
+ includedResources:
+ - namespaces
+ - configmaps
+ - secrets
+ excludedResources:
+ - gotemplates.gotemplating.fn.crossplane.io
+ - kclinputs.template.fn.crossplane.io
+crossplane:
+ distribution: universal-crossplane
+ namespace: crossplane-system
+ version: 1.17.3-up.1
+ featureFlags:
+ - --enable-provider-identity
+ - --enable-environment-configs
+ - --enable-composition-functions
+ - --enable-usages
+stats:
+ total: 68
+ nativeResources:
+ configmaps: 0
+ namespaces: 3
+ secrets: 5
+ customResources:
+ amicopies.ec2.aws.upbound.io: 0
+ amilaunchpermissions.ec2.aws.upbound.io: 0
+ amis.ec2.aws.upbound.io: 0
+ availabilityzonegroups.ec2.aws.upbound.io: 0
+ capacityreservations.ec2.aws.upbound.io: 0
+ carriergateways.ec2.aws.upbound.io: 0
+ compositeresourcedefinitions.apiextensions.crossplane.io: 0
+ compositionrevisions.apiextensions.crossplane.io: 2
+ compositions.apiextensions.crossplane.io: 0
+ configurationrevisions.pkg.crossplane.io: 0
+ configurations.pkg.crossplane.io: 1
+...redacted
+```
+
+
+
+### Skipped resources
+
+Along with to the resources excluded via CLI options, the following resources aren't
+included in the backup:
+
+- The `kube-root-ca.crt` ConfigMap, since this is cluster-specific
+- Resources directly managed via Helm (ArgoCD's helm implementation, which templates
+Helm resources and then applies them, get included in the backup). The migration creates the exclusion list by looking for:
+ - Any Resource with the label `"app.kubernetes.io/managed-by" == "Helm"`
+ - Kubernetes Secrets with the label prefix `helm.sh/release`. For example, `helm.sh/release.v1`
+- Resources installed via a Crossplane package. These have an `ownerReference` with
+a prefix `pkg.crossplane.io`. The expectation is that during import, the Crossplane Package Manager bears responsibility for installing the resources.
+- Crossplane Locks: Any `Lock.pkg.crossplane.io` resource isn't included in the
+export.
+
+## Restore
+
+The following is an example of a successful import run. At the end of the import, all Managed Resources are in a paused state.
+
+
+
+View the migration import
+
+```bash
+$ up controlplane migration import
+Importing control plane state...
+✓ Reading state from the archive... Done! 👀
+✓ Importing base resources... 18 resources imported! 📥
+✓ Waiting for XRDs... Established! ⏳
+✓ Waiting for Packages... Installed and Healthy! ⏳
+✓ Importing remaining resources... 50 resources imported! 📥
+✓ Finalizing import... Done! 🎉
+```
+
+
+
+Your scenario may involve migrating resources which already exist through other automation on the platform. When executing an import in these circumstances, the importer applies the new manifests to the cluster. If the resource already exists, the restore sets fields to what's in the backup.
+
+The importer restores all resources in the export archive. Managed Resources get imported with the `crossplane.io/paused: "true"` annotation set. Use the `--unpause-after-import` CLI argument to automatically un-pause resources that got
+paused during backup, or remove the annotation manually.
+
+### Restore order
+
+The importer restores based on Kubernetes types. The restore order doesn't include parent/child relationships.
+
+Because Crossplane Composites create new Managed Resources if not present on the cluster, all
+Claims, Composites and Managed Resources get imported in a paused state. You can un-pause them after the restore completes.
+
+The first step of import is installing Base Resources into the cluster. These resources (such has
+packages and XRDs) must be ready before proceeding with the import.
+Base Resources are:
+
+- Kubernetes Resources
+ - ConfigMaps
+ - Namespaces
+ - Secrets
+- Crossplane Resources
+ - ControllerConfigs: `controllerconfigs.pkg.crossplane.io`
+ - DeploymentRuntimeConfigs: `deploymentruntimeconfigs.pkg.crossplane.io`
+ - StoreConfigs: `storeconfigs.secrets.crossplane.io`
+- Crossplane Packages
+ - Providers: `providers.pkg.crossplane.io`
+ - Functions: `functions.pkg.crossplane.io`
+ - Configurations: `configurations.pkg.crossplane.io`
+
+Restore waits for the base resources to be `Ready` before moving on to the next step. Next, restore walks through the archive and restores all the manifests present.
+
+During import, the `crossplane.io/paused` annotation gets added to Managed Resources, Claims
+and Composites.
+
+To manually un-pause managed resources after an import, remove the annotation by running:
+
+```bash
+kubectl annotate managed --all crossplane.io/paused-
+```
+
+You can also run import again with the `--unpause-after-import` flag to remove the annotations.
+
+```bash
+up controlplane migration import --unpause-after-import
+```
+
+### Restoring resource status
+
+The importer applies the status of all resources during import. The importer determines if the CRD version has a status field defined based on the stored CRD version.
+
+
+[cli-command]: /reference/cli-reference
+[up-cli]: /reference/cli-reference
+[up-cli-1]: /manuals/cli/overview
+[create-command]: /reference/cli-reference
+[up-ctx]: /reference/cli-reference
+[configuration-aws-network]: https://marketplace.upbound.io/configurations/upbound/configuration-aws-network
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/mirror-images.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/mirror-images.md
new file mode 100644
index 00000000..c19902f1
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/mirror-images.md
@@ -0,0 +1,83 @@
+---
+title: Mirror Spaces images
+description: Mirror OCI artifacts for a Spaces version to local storage or a
+ private registry.
+---
+
+`up space mirror` copies all OCI artifacts for a given Spaces version to a local
+directory (as `.tar.gz` files) or a container registry.
+
+For full usage, flags, and examples, see the [up space mirror][cli-mirror]
+section of the CLI reference.
+
+## Prerequisites
+
+* The [Up CLI][cli-reference] installed
+* An Upbound token file (JSON with `accessId` and `token`) for registry auth.
+ Example:
+
+ ```json
+ {
+ "accessId": "",
+ "token": ""
+ }
+ ```
+
+## Mirror to a local directory
+
+To export artifacts as `.tar.gz` files into a directory:
+
+```bash
+up space mirror -v --output-dir= --token-file=
+```
+
+Example:
+
+```bash
+up space mirror -v 1.15.2 --output-dir=/tmp/spaces-artifacts --token-file=upbound-token.json
+```
+
+## Specify your internal registry
+
+When you install Upbound with Helm in a proxied environment, please update the specified registry with your internal registry.
+
+
+```bash
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ --set "ingress.host=${SPACES_ROUTER_HOST}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "authentication.hubIdentities=true" \
+ --set "authorization.hubRBAC=true" \
+ --set "registry=registry.company.corp/spaces" \
+ --set "controlPlanes.uxp.registryOverride=registry.company.corp/xpkg.upbound.io" \
+ --set "controlPlanes.uxp.repository=registry.company.corp/spaces" \
+ --wait
+```
+
+
+## Mirror to a private registry
+
+To push artifacts to your own container registry:
+
+1. Log in to the registry (for example, `docker login myregistry.io`).
+
+2. Run the mirror command with `--destination-registry`:
+
+```bash
+up space mirror -v --destination-registry= --token-file=
+```
+
+Example:
+
+```bash
+up space mirror -v 1.15.2 --destination-registry=myregistry.io --token-file=upbound-token.json
+```
+
+:::tip
+Use `--dry-run` to list artifacts the command would mirror without copying them. This verifies you have proper access to the Upbound registry.
+:::
+
+[cli-mirror]: /reference/cli-reference#up-space-mirror
+[cli-reference]: /reference/cli-reference
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/observability.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/observability.md
new file mode 100644
index 00000000..e627954d
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/observability.md
@@ -0,0 +1,329 @@
+---
+title: Observability
+sidebar_position: 50
+description: A guide for how to use the integrated observability pipeline feature
+ in a Space.
+plan: "enterprise"
+---
+
+
+
+This guide explains how to configure control plane observability in Upbound
+Spaces. Upbound provides integrated observability features built on
+[OpenTelemetry][opentelemetry] to collect, process, and export logs, metrics,
+and traces from workloads running within individual control planes.
+
+
+
+:::tip
+For self-hosted Space administrators who want to observe the cluster
+infrastructure, see the
+[Space-level observability guide][space-level-o11y]. That guide covers
+infrastructure metrics, router metrics, and [distributed tracing](/self-hosted-spaces/howtos/tracing/overview).
+:::
+
+
+## Prerequisites
+
+
+**Control plane observability** is enabled by default. No additional setup is
+required.
+
+
+
+### Self-hosted Spaces
+
+1. **Enable the observability feature** when installing Spaces:
+ ```bash
+ up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "observability.enabled=true"
+ ```
+
+Set `features.alpha.observability.enabled=true` instead if using Spaces version
+before `v1.14.0`.
+
+## Control plane observability
+
+Control plane observability collects telemetry data from workloads running
+within individual control planes using `SharedTelemetryConfig` resources.
+
+The pipeline deploys [OpenTelemetry Collectors][opentelemetry-collectors] per
+control plane, defined by a `SharedTelemetryConfig` at the group level.
+Collectors pass data to external observability backends.
+
+:::important
+From Spaces `v1.13` and beyond, telemetry only includes user-facing control
+plane workloads (Crossplane, providers, functions).
+
+Self-hosted users can include system workloads (`api-server`, `etcd`) by setting
+`observability.collectors.includeSystemTelemetry=true` in Helm.
+:::
+
+:::important
+Spaces validates `SharedTelemetryConfig` resources before applying them by
+sending telemetry to configured exporters. For self-hosted Spaces, ensure that
+`spaces-controller` can reach the exporter endpoints.
+:::
+
+### `SharedTelemetryConfig`
+
+`SharedTelemetryConfig` is a group-scoped custom resource that defines telemetry
+configuration for control planes.
+
+#### New Relic example
+
+```yaml
+apiVersion: observability.spaces.upbound.io/v1alpha1
+kind: SharedTelemetryConfig
+metadata:
+ name: newrelic
+ namespace: default
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ org: foo
+ exporters:
+ otlphttp:
+ endpoint: https://otlp.nr-data.net
+ headers:
+ api-key: YOUR_API_KEY
+ exportPipeline:
+ metrics: [otlphttp]
+ traces: [otlphttp]
+ logs: [otlphttp]
+```
+
+#### Datadog Example
+
+```yaml
+apiVersion: observability.spaces.upbound.io/v1alpha1
+kind: SharedTelemetryConfig
+metadata:
+ name: datadog
+ namespace: default
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ org: foo
+ exporters:
+ datadog:
+ api:
+ site: ${DATADOG_SITE}
+ key: ${DATADOG_API_KEY}
+ exportPipeline:
+ metrics: [datadog]
+ traces: [datadog]
+ logs: [datadog]
+```
+
+
+
+#### Splunk HEC Example
+
+
+
+```yaml
+apiVersion: observability.spaces.upbound.io/v1alpha1
+kind: SharedTelemetryConfig
+metadata:
+ name: splunk
+ namespace: default
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ org: foo
+ exporters:
+ splunk_hec:
+ endpoint: https://splunk.example.com:8088/services/collector
+ token: ${SPLUNK_HEC_TOKEN}
+ exportPipeline:
+ metrics: [splunk_hec]
+ traces: [splunk_hec]
+ logs: [splunk_hec]
+```
+
+### Control plane selection
+
+Use `spec.controlPlaneSelector` to specify which control planes should use the
+telemetry configuration.
+
+#### Label-based selection
+
+```yaml
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+```
+
+#### Expression-based selection
+
+```yaml
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchExpressions:
+ - { key: environment, operator: In, values: [production,staging] }
+```
+
+#### Name-based selection
+
+```yaml
+spec:
+ controlPlaneSelector:
+ names:
+ - controlplane-dev
+ - controlplane-staging
+ - controlplane-prod
+```
+
+### Manage sensitive data
+
+:::important
+Available from Spaces `v1.10`
+:::
+
+Store sensitive data in Kubernetes secrets and reference them in your
+`SharedTelemetryConfig`:
+
+1. **Create the secret:**
+ ```bash
+ kubectl create secret generic sensitive -n \
+ --from-literal=apiKey='YOUR_API_KEY'
+ ```
+
+2. **Reference in SharedTelemetryConfig:**
+ ```yaml
+ apiVersion: observability.spaces.upbound.io/v1alpha1
+ kind: SharedTelemetryConfig
+ metadata:
+ name: newrelic
+ spec:
+ configPatchSecretRefs:
+ - name: sensitive
+ key: apiKey
+ path: exporters.otlphttp.headers.api-key
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ org: foo
+ exporters:
+ otlphttp:
+ endpoint: https://otlp.nr-data.net
+ headers:
+ api-key: dummy # Replaced by secret value
+ exportPipeline:
+ metrics: [otlphttp]
+ traces: [otlphttp]
+ logs: [otlphttp]
+ ```
+
+### Telemetry processing
+
+:::important
+Available from Spaces `v1.11`
+:::
+
+Configure processing pipelines to transform telemetry data using the [transform
+processor][transform-processor].
+
+#### Add labels to metrics
+
+```yaml
+spec:
+ processors:
+ transform:
+ error_mode: ignore
+ metric_statements:
+ - context: datapoint
+ statements:
+ - set(attributes["newLabel"], "someLabel")
+ processorPipeline:
+ metrics: [transform]
+```
+
+#### Remove labels
+
+From metrics:
+```yaml
+processors:
+ transform:
+ metric_statements:
+ - context: datapoint
+ statements:
+ - delete_key(attributes, "kubernetes_namespace")
+```
+
+From logs:
+```yaml
+processors:
+ transform:
+ log_statements:
+ - context: log
+ statements:
+ - delete_key(attributes, "log.file.name")
+```
+
+#### Modify log messages
+
+```yaml
+processors:
+ transform:
+ log_statements:
+ - context: log
+ statements:
+ - set(attributes["original"], body)
+ - set(body, Concat(["log message:", body], " "))
+```
+
+### Monitor status
+
+Check the status of your `SharedTelemetryConfig`:
+
+```bash
+kubectl get stc
+NAME SELECTED FAILED PROVISIONED AGE
+datadog 1 0 1 63s
+```
+
+- `SELECTED`: Number of control planes selected
+- `FAILED`: Number of control planes that failed provisioning
+- `PROVISIONED`: Number of successfully running collectors
+
+For detailed status information:
+
+```bash
+kubectl describe stc
+```
+
+## Supported exporters
+
+Upbound Spaces supports the following exporters:
+- `datadog` - For Datadog integration
+- `otlphttp` - General-purpose exporter (used by New Relic, among others)
+
+- `splunk_hec` - For Splunk HTTP Event Collector integration
+
+- `debug` - For troubleshooting
+
+## Considerations
+
+- **Control plane conflicts**: Each control plane can only use one `SharedTelemetryConfig`. Multiple configs selecting the same control plane conflict.
+- **Resource scope**: `SharedTelemetryConfig` resources are group-scoped, allowing different telemetry configurations per group.
+
+For more advanced configuration options, review the [Helm chart
+reference][helm-chart-reference] and [OpenTelemetry Transformation Language
+documentation][opentelemetry-transformation-language].
+
+
+[opentelemetry]: https://opentelemetry.io/
+[opentelemetry-collectors]: https://opentelemetry.io/docs/collector/
+[transform-processor]: https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/processor/transformprocessor/README.md
+[opentelemetry-transformation-language]: https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/pkg/ottl
+[space-level-o11y]: /self-hosted-spaces/howtos/space-observability
+[helm-chart-reference]: /reference/spaces-helm-reference/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/oidc-configuration.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/oidc-configuration.md
new file mode 100644
index 00000000..1c03f418
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/oidc-configuration.md
@@ -0,0 +1,284 @@
+---
+title: Configure OIDC
+sidebar_position: 20
+description: Configure OIDC in your Space
+---
+:::important
+This guide is only applicable for administrators who've deployed self-hosted Spaces. For general RBAC in Upbound, read [Upbound RBAC][upbound-rbac].
+:::
+
+Upbound uses the Kubernetes [Structured Authentication Configuration][structured-auth-config] to validate OIDC tokens sent to the API. Upbound stores this
+configuration as a `ConfigMap` and authenticates with the Upbound router
+component during installation with Helm.
+
+This guide walks you through how to create and apply an authentication
+configuration to validate Upbound with an external identity provider. Each
+section focuses on a specific part of the configuration file.
+
+
+## Creating the `AuthenticationConfiguration` file
+
+First, create a file called `config.yaml` with an `AuthenticationConfiguration`
+kind. The `AuthenticationConfiguration` is the initial authentication structure
+necessary for Upbound to communicate with your chosen identity provider.
+
+```yaml
+apiVersion: apiserver.config.k8s.io/v1beta1
+kind: AuthenticationConfiguration
+jwt:
+- issuer:
+ url: oidc-issuer-url
+ audiences:
+ - oidc-client-id
+ claimMappings: # optional
+ username:
+ claim: oidc-username-claim
+ prefix: oidc-username-prefix
+ groups:
+ claim: oidc-groups-claim
+ prefix: oidc-groups-prefix
+```
+
+
+For detailed configuration options, including the CEL-based token validation,
+review the feature [documentation][structured-auth-config].
+
+
+The `AuthenticationConfiguration` allows you to configure multiple JWT
+authenticators as separate issuers.
+
+### Configure an issuer
+
+The `jwt` array requires an `issuer` specification and typically contains:
+
+- A `username` claim mapping
+- A `groups` claim mapping
+Optionally, the configuration may also include:
+- A set of claim validation rules
+- A set of user validation rules
+
+The `issuer` URL must be unique across all configured authenticators.
+
+```yaml
+issuer:
+ url: https://example.com
+ discoveryUrl: https://discovery.example.com/.well-known/openid-configuration
+ certificateAuthority: |-
+
+ audiences:
+ - client-id-a
+ - client-id-b
+ audienceMatchPolicy: MatchAny
+```
+
+By default, the authenticator assumes the OIDC Discovery URL is
+`{issuer.url}/.well-known/openid-configuration`. Most identity providers follow
+this structure, and you can omit the `discoveryUrl` field. To use a separate
+discovery service, specify the full path to the discovery endpoint in this
+field.
+
+If the CA for the Issuer isn't public, provide the PEM encoded CA for the Discovery URL.
+
+At least one of the `audiences` entries must match the `aud` claim in the JWT.
+For OIDC tokens, this is the Client ID of the application attempting to access
+the Upbound API. Having multiple values set allows the same configuration to
+apply to multiple client applications, for example the `kubectl` CLI and an
+Internal Developer Portal.
+
+If you specify multiple `audiences` , `audienceMatchPolicy` must equal `MatchAny`.
+
+### Configure `claimMappings`
+
+#### Username claim mapping
+
+By default, the authenticator uses the `sub` claim as the user name. To override this, either:
+
+- specify *both* `claim` and `prefix`. `prefix` may be explicitly set to the empty string.
+or
+
+- specify a CEL `expression` to calculate the user name.
+
+```yaml
+claimMappings:
+ username:
+ claim: "sub"
+ prefix: "keycloak"
+ #
+ expression: 'claims.username + ":external-user"'
+```
+
+
+#### Groups claim mapping
+
+By default, this configuration doesn't map groups, unless you either:
+
+- specify both `claim` and `prefix`. `prefix` may be explicitly set to the empty string.
+or
+
+- specify a CEL `expression` that returns a string or list of strings.
+
+
+```yaml
+claimMappings:
+ groups:
+ claim: "groups"
+ prefix: ""
+ #
+ expression: 'claims.roles.split(",")'
+```
+
+
+### Validation rules
+
+
+Validation rules are outside the scope of this document. Review the
+[documentation][structured-auth-config] for more information. Examples include
+using CEL expressions to validate authentication such as:
+
+
+- Validating that a token claim has a specific value
+- Validating that a token has a limited lifetime
+- Ensuring usernames and groups don't contain reserved prefixes
+
+## Required claims
+
+To interact with Space and ControlPlane APIs, users must have the `upbound.io/aud` claim set to one of the following:
+
+| Upbound.io Audience | Notes |
+| -------------------------------------------------------- | -------------------------------------------------------------------- |
+| `[]` | No Access to Space-level or ControlPlane APIs |
+| `['upbound:spaces:api']` | This Identity is only for Space-level APIs |
+| `['upbound:spaces:controlplanes']` | This Identity is only for ControlPlane APIs |
+| `['upbound:spaces:api', 'upbound:spaces:controlplanes']` | This Identity is for both Space-level and ControlPlane APIs |
+
+
+You can set this claim in two ways:
+
+- In the identity provider mapped in the ID token.
+- Inject in the authenticator with the `jwt.claimMappings.extra` array.
+
+For example:
+```yaml
+apiVersion: apiserver.config.k8s.io/v1beta1
+kind: AuthenticationConfiguration
+jwt:
+- issuer:
+ url: https://keycloak:8443/realms/master
+ certificateAuthority: |-
+
+ audiences:
+ - master-realm
+ audienceMatchPolicy: MatchAny
+ claimMappings:
+ username:
+ claim: "preferred_username"
+ prefix: "keycloak:"
+ groups:
+ claim: "groups"
+ prefix: ""
+ extra:
+ - key: 'upbound.io/aud'
+ valueExpression: "['upbound:spaces:controlplanes', 'upbound:spaces:api']"
+```
+
+## Install the `AuthenticationConfiguration`
+
+Once you create an `AuthenticationConfiguration` file, specify this file as a
+`ConfigMap` in the host cluster for the Upbound Space.
+
+```sh
+kubectl create configmap -n upbound-system --from-file=config.yaml=./path/to/config.yaml
+```
+
+
+To enable OIDC authentication and disable Upbound IAM when installing the Space,
+reference the configuration and pass an empty value to the Upbound IAM issuer
+parameter:
+
+
+```sh
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "authentication.structuredConfig=" \
+ --set "router.controlPlane.extraArgs[0]=--upbound-iam-issuer-url="
+```
+
+## Configure RBAC
+
+
+In this scenario, the external identity provider handles authentication, but
+permissions for Spaces and ControlPlane APIs use standard RBAC objects.
+
+### Spaces APIs
+
+The Spaces APIs include:
+```yaml
+- apiGroups:
+ - spaces.upbound.io
+ resources:
+ - controlplanes
+ - sharedexternalsecrets
+ - sharedsecretstores
+ - backups
+ - backupschedules
+ - sharedbackups
+ - sharedbackupconfigs
+ - sharedbackupschedules
+- apiGroups:
+ - observability.spaces.upbound.io
+ resources:
+ - sharedtelemetryconfigs
+```
+
+### ControlPlane APIs
+
+
+
+Crossplane specifies three [roles][crossplane-managed-clusterroles] for a
+ControlPlane: admin, editor, and viewer. These map to the verbs `admin`, `edit`,
+and `view` on the `controlplanes/k8s` resource in the `spaces.upbound.io` API
+group.
+
+
+### Control access
+
+The `groups` claim in the `AuthenticationConfiguration` allows you to control
+resource access when you create a `ClusterRoleBinding`. A `ClusterRole` defines
+the role parameters and a `ClusterRoleBinding` subject.
+
+The example below allows `admin` permissions for all ControlPlanes to members of
+the `ctp-admins` group:
+
+```yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+ name: allow-ctp-admin
+rules:
+- apiGroups:
+ - spaces.upbound.io
+ resources:
+ - controlplanes/k8s
+ verbs:
+ - admin
+```
+
+ctp-admins ClusterRoleBinding
+```yaml
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+ name: allow-ctp-admin
+roleRef:
+ apiGroup: rbac.authorization.k8s.io
+ kind: ClusterRole
+ name: allow-ctp-admin
+subjects:
+- apiGroup: rbac.authorization.k8s.io
+ kind: Group
+ name: ctp-admins
+```
+
+[structured-auth-config]: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-authentication-configuration
+[crossplane-managed-clusterroles]: https://github.com/crossplane/crossplane/blob/master/design/design-doc-rbac-manager.md#managed-rbac-clusterroles
+[upbound-rbac]: /manuals/platform/rbac
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/query-api.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/query-api.md
new file mode 100644
index 00000000..c55fa440
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/query-api.md
@@ -0,0 +1,315 @@
+---
+title: Query API
+sidebar_position: 40
+description: Use the `up` CLI to query objects and resources
+---
+
+
+
+
+Upbound's Query API allows users to inspect objects and resources within their control planes. The read-only `up alpha query` and `up alpha get` CLI commands allow you to gather information on your control planes in a fast and efficient package. These commands follow the [`kubectl` conventions][kubectl-conventions] for filtering, sorting, and retrieving information from your Space.
+
+
+
+
+## Using the Query API
+
+
+The Query API allows you to retrieve control plane information faster than traditional `kubectl` commands. This feature lets you debug your Crossplane resources with the CLI or within the Upbound Console's enhanced management views.
+
+### Query within a single control plane
+
+Use the `up alpha get` command to retrieve information about objects within the current control plane context. This command uses the **Query** endpoint and targets the current control plane.
+
+To switch between control plane groups, use the [`up ctx` ][up-ctx] and change to your desired context with an interactive prompt or specify with your control plane path:
+
+```shell
+up ctx ///
+```
+
+You can query within a single control plane with the [`up alpha get` command][up-alpha-get-command] to return more information about a given object within the current kubeconfig context.
+
+The `up alpha get` command can query resource types and aliases to return objects in your control plane.
+
+```shell
+up alpha get managed
+NAME READY SYNCED AGE
+custom-account1-5bv5j-sa True True 15m
+custom-cluster1-bq6dk-net True True 15m
+custom-account1-5bv5j-subnet True True 15m
+custom-cluster1-bq6dk-nodepool True True 15m
+custom-cluster1-bq6dk-cluster True True 15m
+custom-account1-5bv5j-net True True 15m
+custom-cluster1-bq6dk-subnet True True 15m
+custom-cluster1-bq6dk-sa True True 15m
+```
+
+The [`-A` flag][a-flag] queries for objects across all namespaces.
+
+```shell
+up alpha get configmaps -A
+NAMESPACE NAME AGE
+crossplane-system uxp-versions-config 18m
+crossplane-system universal-crossplane-config 18m
+crossplane-system kube-root-ca.crt 18m
+upbound-system kube-root-ca.crt 18m
+kube-system kube-root-ca.crt 18m
+kube-system coredns 18m
+default kube-root-ca.crt 18m
+kube-node-lease kube-root-ca.crt 18m
+kube-public kube-root-ca.crt 18m
+kube-system kube-apiserver-legacy-service-account-token-tracking 18m
+kube-system extension-apiserver-authentication 18m
+```
+
+To query for [multiple resource types][multiple-resource-types], you can add the name or alias for the resource as a comma separated string.
+
+```shell
+up alpha get providers,providerrevisions
+
+NAME HEALTHY REVISION IMAGE STATE DEP-FOUND DEP-INSTALLED AGE
+providerrevision.pkg.crossplane.io/crossplane-contrib-provider-nop-ecc25c121431 True 1 xpkg.upbound.io/crossplane-contrib/provider-nop:v0.2.1 Active 18m
+NAME INSTALLED HEALTHY PACKAGE AGE
+provider.pkg.crossplane.io/crossplane-contrib-provider-nop True True xpkg.upbound.io/crossplane-contrib/provider-nop:v0.2.1 18m
+```
+
+### Query multiple control planes
+
+The [`up alpha query` command][up-alpha-query-command] returns a list of objects of any kind within all the control planes in your Space. This command uses either the **SpaceQuery** or **GroupQuery** endpoints depending on your query scope. The `-A` flag switches the query context from the group level to the entire Space
+
+The `up alpha query` command accepts resources and aliases to return objects across your group or Space.
+
+```shell
+up alpha query crossplane
+
+NAME ESTABLISHED OFFERED AGE
+compositeresourcedefinition.apiextensions.crossplane.io/xnetworks.platform.acme.co True True 20m
+compositeresourcedefinition.apiextensions.crossplane.io/xaccountscaffolds.platform.acme.co True True 20m
+
+
+NAME XR-KIND XR-APIVERSION AGE
+composition.apiextensions.crossplane.io/xaccountscaffolds.platform.acme.co XAccountScaffold platform.acme.co/v1alpha1 20m
+composition.apiextensions.crossplane.io/xnetworks.platform.acme.co XNetwork platform.acme.co/v1alpha1 20m
+
+
+NAME REVISION XR-KIND XR-APIVERSION AGE
+compositionrevision.apiextensions.crossplane.io/xaccountscaffolds.platform.acme.co-5ae9da5 1 XAccountScaffold platform.acme.co/v1alpha1 20m
+compositionrevision.apiextensions.crossplane.io/xnetworks.platform.acme.co-414ce80 1 XNetwork platform.acme.co/v1alpha1 20m
+
+NAME READY SYNCED AGE
+nopresource.nop.crossplane.io/custom-cluster1-bq6dk-subnet True True 19m
+nopresource.nop.crossplane.io/custom-account1-5bv5j-net True True 19m
+
+## Output truncated...
+
+```
+
+
+The [`--sort-by` flag][sort-by-flag] allows you to return information to your specifications. You can construct your sort order in a JSONPath expression string or integer.
+
+
+```shell
+up alpha query crossplane -A --sort-by="{.metadata.name}"
+
+CONTROLPLANE NAME AGE
+default/test deploymentruntimeconfig.pkg.crossplane.io/default 10m
+
+CONTROLPLANE NAME AGE TYPE DEFAULT-SCOPE
+default/test storeconfig.secrets.crossplane.io/default 10m Kubernetes crossplane-system
+```
+
+To query for multiple resource types, you can add the name or alias for the resource as a comma separated string.
+
+```shell
+up alpha query namespaces,configmaps -A
+
+CONTROLPLANE NAME AGE
+default/test namespace/upbound-system 15m
+default/test namespace/crossplane-system 15m
+default/test namespace/kube-system 16m
+default/test namespace/default 16m
+
+CONTROLPLANE NAMESPACE NAME AGE
+default/test crossplane-system configmap/uxp-versions-config 15m
+default/test crossplane-system configmap/universal-crossplane-config 15m
+default/test crossplane-system configmap/kube-root-ca.crt 15m
+default/test upbound-system configmap/kube-root-ca.crt 15m
+default/test kube-system configmap/coredns 16m
+default/test default configmap/kube-root-ca.crt 16m
+
+## Output truncated...
+
+```
+
+The Query API also allows you to return resource types with specific [label columns][label-columns].
+
+```shell
+up alpha query composite -A --label-columns=crossplane.io/claim-namespace
+
+CONTROLPLANE NAME SYNCED READY COMPOSITION AGE CLAIM-NAMESPACE
+query-api-test/test xeks.argo.discover.upbound.io/test-k7xbk False xeks.argo.discover.upbound.io 51d default
+
+CONTROLPLANE NAME EXTERNALDNS SYNCED READY COMPOSITION AGE CLAIM-NAMESPACE
+spaces-clusters/controlplane-query-api-test-spaces-playground xexternaldns.externaldns.platform.upbound.io/spaces-cluster-0-xd8v2-lhnl7 6.34.2 True True xexternaldns.externaldns.platform.upbound.io 19d default
+default/query-api-test xexternaldns.externaldns.platform.upbound.io/space-awg-kine-f7dxq-nkk2q 6.34.2 True True xexternaldns.externaldns.platform.upbound.io 55d default
+
+## Output truncated...
+
+```
+
+### Query API request format
+
+The CLI can also return a version of your query request with the [`--debug` flag][debug-flag]. This flag returns the API spec request for your query.
+
+```shell
+up alpha query composite -A -d
+
+apiVersion: query.spaces.upbound.io/v1alpha1
+kind: SpaceQuery
+metadata:
+ creationTimestamp: null
+spec:
+ cursor: true
+ filter:
+ categories:
+ - composite
+ controlPlane: {}
+ limit: 500
+ objects:
+ controlPlane: true
+ table: {}
+ page: {}
+```
+
+For more complex queries, you can interact with the Query API like a Kubernetes-style API by creating a query and applying it with `kubectl`.
+
+The example below is a query for `claim` resources in every control plane from oldest to newest and returns specific information about those claims.
+
+
+```yaml
+apiVersion: query.spaces.upbound.io/v1alpha1
+kind: SpaceQuery
+spec:
+ filter:
+ categories:
+ - claim
+ order:
+ - creationTimestamp: Asc
+ cursor: true
+ count: true
+ objects:
+ id: true
+ controlPlane: true
+ object:
+ kind: true
+ apiVersion: true
+ metadata:
+ name: true
+ uid: true
+ spec:
+ containers:
+ image: true
+```
+
+
+The Query API is served by the Spaces API endpoint. You can use `up ctx` to
+switch the kubectl context to the Spaces API ingress. After that, you can use
+`kubectl create` and receive the `response` for your query parameters.
+
+
+```shell
+kubectl create -f spaces-query.yaml -o yaml
+```
+
+Your `response` should look similar to this example:
+
+```yaml {copy-lines="none"}
+apiVersion: query.spaces.upbound.io/v1alpha1
+kind: SpaceQuery
+metadata:
+ creationTimestamp: "2024-08-08T14:41:46Z"
+ name: default
+response:
+ count: 3
+ cursor:
+ next: ""
+ page: 0
+ pageSize: 100
+ position: 0
+ objects:
+ - controlPlane:
+ name: query-api-test
+ namespace: default
+ id: default/query-api-test/823b2781-7e70-4d91-a6f0-ee8f455d67dc
+ object:
+ apiVersion: spaces.platform.upbound.io/v1alpha1
+ kind: Space
+ metadata:
+ name: space-awg-kine
+ resourceVersion: "803868"
+ uid: 823b2781-7e70-4d91-a6f0-ee8f455d67dc
+ spec: {}
+ - controlPlane:
+ name: test-1
+ namespace: test
+ id: test/test-1/08a573dd-851a-42cc-a600-b6f6ed37ee8d
+ object:
+ apiVersion: argo.discover.upbound.io/v1alpha1
+ kind: EKS
+ metadata:
+ name: test-1
+ resourceVersion: "4270320"
+ uid: 08a573dd-851a-42cc-a600-b6f6ed37ee8d
+ spec: {}
+ - controlPlane:
+ name: controlplane-query-api-test-spaces-playground
+ namespace: spaces-clusters
+ id: spaces-clusters/controlplane-query-api-test-spaces-playground/b5a6770f-1f85-4d09-8990-997c84bd4159
+ object:
+ apiVersion: spaces.platform.upbound.io/v1alpha1
+ kind: Space
+ metadata:
+ name: spaces-cluster-0
+ resourceVersion: "1408337"
+ uid: b5a6770f-1f85-4d09-8990-997c84bd4159
+ spec: {}
+```
+
+
+## Query API Explorer
+
+
+
+import CrdDocViewer from '@site/src/components/CrdViewer';
+
+### Query
+
+The Query resource allows you to query objects in a single control plane.
+
+
+
+### GroupQuery
+
+The GroupQuery resource allows you to query objects across a group of control planes.
+
+
+
+### SpaceQuery
+
+The SpaceQuery resource allows you to query objects across all control planes in a space.
+
+
+
+
+
+
+[documentation]: /self-hosted-spaces/howtos/query-api
+[up-ctx]: /reference/cli-reference
+[up-alpha-get-command]: /reference/cli-reference
+[a-flag]: /reference/cli-reference
+[multiple-resource-types]: /reference/cli-reference
+[up-alpha-query-command]: /reference/cli-reference
+[sort-by-flag]: /reference/cli-reference
+[label-columns]: /reference/cli-reference
+[debug-flag]: /reference/cli-reference
+[kubectl-conventions]: https://kubernetes.io/docs/reference/kubectl/generated/kubectl_get/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/scaling-resources.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/scaling-resources.md
new file mode 100644
index 00000000..aba74f0e
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/scaling-resources.md
@@ -0,0 +1,179 @@
+---
+title: Scaling vCluster and etcd Resources
+weight: 950
+description: A guide for scaling vCluster and etcd resources in self-hosted Spaces
+aliases:
+ - /all-spaces/self-hosted-spaces/scaling-resources
+ - /spaces/scaling-resources
+---
+
+In large workloads or control plane migration, you may performance impacting
+resource constraints. This guide explains how to scale vCluster and `etcd`
+resources for optimal performance in your self-hosted Space.
+
+
+## Signs of resource constraints
+
+You may need to scale your vCluster or `etcd` resources if you observe:
+
+- API server timeout errors such as `http: Handler timeout`
+- Error messages about `too many requests` and requests to `try again later`
+- Operations like provider installation failing with errors like `cannot apply provider package secret`
+- vCluster pods experiencing continuous restarts
+- API performance degrades with high resource volume
+
+
+## Scaling vCluster resources
+
+
+The vCluster component handles Kubernetes API requests for your control planes.
+Deployments with multiple control planes or providers may exceed default resource allocations.
+
+```yaml
+# Default settings
+controlPlanes.vcluster.resources.limits.cpu: "3000m"
+controlPlanes.vcluster.resources.limits.memory: "3960Mi"
+controlPlanes.vcluster.resources.requests.cpu: "170m"
+controlPlanes.vcluster.resources.requests.memory: "1320Mi"
+```
+
+For larger workloads, like migrating from an existing control plane with several
+providers, increase these resource limits in your Spaces `values.yaml` file.
+
+```yaml
+controlPlanes:
+ vcluster:
+ resources:
+ limits:
+ cpu: "4000m" # Increase to 4 cores
+ memory: "6Gi" # Increase to 6GB memory
+ requests:
+ cpu: "500m" # Increase baseline CPU request
+ memory: "2Gi" # Increase baseline memory request
+```
+
+## Scaling `etcd` storage
+
+Kubernetes relies on `etcd` performance, which can lead to IOPS (input/output
+operations per second) bottlenecks. Upbound allocates `50Gi` volumes for `etcd`
+in cloud environments to ensure adequate IOPS performance.
+
+```yaml
+# Default setting
+controlPlanes.etcd.persistence.size: "5Gi"
+```
+
+For production environments or when migrating large control planes, increase
+`etcd` volume size and specify an appropriate storage class:
+
+```yaml
+controlPlanes:
+ etcd:
+ persistence:
+ size: "50Gi" # Recommended for production
+ storageClassName: "fast-ssd" # Use a high-performance storage class
+```
+
+### Storage class considerations
+
+For AWS:
+- Use GP3 volumes with adequate IOPS
+- For AWS GP3 volumes, IOPS scale with volume size (3000 IOPS baseline)
+- For optimal performance, provision at least 32Gi to support up to 16,000 IOPS
+
+For GCP and Azure:
+- Use SSD-based persistent disk types for optimal performance
+- Consider premium storage options for high-throughput workloads
+
+## Scaling Crossplane resources
+
+Crossplane manages provider resources in your control planes. You may need to increase provider resources for larger deployments:
+
+```yaml
+# Default settings
+controlPlanes.uxp.resourcesCrossplane.requests.cpu: "370m"
+controlPlanes.uxp.resourcesCrossplane.requests.memory: "400Mi"
+```
+
+
+For environments with many providers or managed resources:
+
+
+```yaml
+controlPlanes:
+ uxp:
+ resourcesCrossplane:
+ limits:
+ cpu: "1000m" # Add CPU limit
+ memory: "1Gi" # Add memory limit
+ requests:
+ cpu: "500m" # Increase CPU request
+ memory: "512Mi" # Increase memory request
+```
+
+## High availability configuration
+
+For production environments, enable High Availability mode to ensure resilience:
+
+```yaml
+controlPlanes:
+ ha:
+ enabled: true
+```
+
+## Best practices for migration scenarios
+
+When migrating from existing control planes into a self-hosted Space:
+
+1. **Pre-scale resources**: Scale up resources before performing the migration
+2. **Monitor resource usage**: Watch resource consumption during and after migration with `kubectl top pods`
+3. **Scale incrementally**: If issues persist, increase resources incrementally until performance stabilizes
+4. **Consider storage performance**: `etcd` is sensitive to storage I/O performance
+
+## Helm values configuration
+
+Apply these settings through your Spaces Helm values file:
+
+```yaml
+controlPlanes:
+ vcluster:
+ resources:
+ limits:
+ cpu: "4000m"
+ memory: "6Gi"
+ requests:
+ cpu: "500m"
+ memory: "2Gi"
+ etcd:
+ persistence:
+ size: "50Gi"
+ storageClassName: "gp3" # Use your cloud provider's fast storage class
+ uxp:
+ resourcesCrossplane:
+ limits:
+ cpu: "1000m"
+ memory: "1Gi"
+ requests:
+ cpu: "500m"
+ memory: "512Mi"
+ ha:
+ enabled: true # For production environments
+```
+
+Apply the configuration using Helm:
+
+```bash
+helm upgrade --install spaces oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ -f values.yaml \
+ -n upbound-system
+```
+
+## Considerations
+
+- **Provider count**: Each provider adds resource overhead - consider using provider families to optimize resource usage
+- **Managed resources**: The number of managed resources impacts CPU usage more than memory
+- **Vertical pod autoscaling**: Consider using vertical pod autoscaling in Kubernetes to automatically adjust resources based on usage
+- **Storage performance**: Storage performance is as important as capacity for etcd
+- **Network latency**: Low-latency connections between components improve performance
+
+
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/secrets-management.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/secrets-management.md
new file mode 100644
index 00000000..82f43eae
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/secrets-management.md
@@ -0,0 +1,727 @@
+---
+title: Secrets Management
+sidebar_position: 20
+description: A guide for how to configure synchronizing external secrets into control
+ planes in a Space.
+---
+
+:::important
+This feature is in **Preview**
+:::
+
+Upbound's _Shared Secrets_ is a built in secrets management feature that
+provides an integrated way to manage secrets across your platform. It allows you
+to store sensitive data like passwords and certificates for your managed control
+planes as secrets in an external secret store.
+
+This feature is a wrapper around the [External Secrets Operator (ESO)][external-secrets-operator-eso] that pulls secrets from external vaults and distributes them across your platform.
+
+
+## Benefits
+
+The Shared Secrets feature allows you to:
+
+* Access secrets from a variety of external secret stores without operation overhead
+* Configure synchronization for multiple control planes in a group
+* Store and manage all your secrets centrally
+* Use Shared Secrets across all Upbound environments(Cloud and Disconnected Spaces)
+* Synchronize secrets across groups of control planes while maintaining clear security boundaries
+* Manage secrets at scale programmatically while ensuring proper isolation and access control
+
+## Understanding the Architecture
+
+The Shared Secrets feature uses a hierarchical approach to centrally manage
+secrets and effectively control their distribution.
+
+
+
+1. The flow begins at the group level, where you define your secret sources and distribution rules
+2. These rules automatically create corresponding resources in your control planes
+3. In each control plane, specific namespaces receive the secrets
+4. Changes at the group level automatically propagate through this chain
+
+## Enable shared Secrets
+
+To enable this feature in a self-hosted Space, set
+`features.alpha.sharedSecrets.enabled=true` when installing the Space:
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "features.alpha.sharedSecrets.enabled=true" \
+```
+
+
+## Component configuration
+
+Upbound Shared Secrets consists of two components:
+
+1. **SharedSecretStore**: Defines connections to external secret providers
+2. **SharedExternalSecret**: Specifies which secrets to synchronize and where
+
+
+### Connect to an External Vault
+
+
+The `SharedSecretStore` component is the connection point to your external
+secret vaults. It provisions ClusterSecretStore resources into control planes
+within the group.
+
+
+#### AWS Secrets Manager
+
+
+
+In this example, you'll create a `SharedSecretStore` to connect to AWS Secrets Manager in `us-west-2`. Then apply access to all control planes labeled with `environment: production`, and make these secrets available in the `default` and `crossplane-system` namespaces.
+
+
+You can configure access to AWS Secrets Manager using static credentials or
+workload identity.
+
+:::important
+While the underlying ESO API supports more auth methods, static credentials are currently the only supported auth method in Cloud Spaces.
+:::
+
+##### Static credentials
+
+1. Use the AWS CLI to create access credentials.
+
+
+2. Create your access credentials.
+```ini
+# Create a text file with AWS credentials
+cat > aws-credentials.txt << EOF
+[default]
+aws_access_key_id =
+aws_secret_access_key =
+EOF
+```
+
+3. Next,store the access credentials in a secret in the namespace you want to have access to the `SharedSecretStore`.
+```shell
+kubectl create secret \
+ generic aws-credentials \
+ -n default \
+ --from-file=creds=./aws-credentials.txt
+```
+
+4. Create a `SharedSecretStore` custom resource file called `secretstore.yaml`.
+ Paste the following configuration:
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: aws-secrets
+spec:
+ # Define which control planes should receive this configuration
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+
+ # Define which namespaces within those control planes can access secrets
+ namespaceSelector:
+ names:
+ - default
+ - crossplane-system
+
+ # Configure the connection to AWS Secrets Manager
+ provider:
+ aws:
+ service: SecretsManager
+ region: us-west-2
+ auth:
+ secretRef:
+ accessKeyIDSecretRef:
+ name: aws-credentials
+ key: access-key-id
+ secretAccessKeySecretRef:
+ name: aws-credentials
+ key: secret-access-key
+```
+
+
+
+##### Workload Identity with IRSA
+
+
+
+You can also use AWS IAM Roles for Service Accounts (IRSA) depending on your
+organizations needs:
+
+1. Ensure you have deployed the Spaces software into an IRSA-enabled EKS cluster.
+2. Follow the AWS instructions to create an IAM OIDC provider with your EKS OIDC
+ provider URL.
+3. Determine the Spaces-generated `controlPlaneID` of your control plane:
+```shell
+kubectl get controlplane -o jsonpath='{.status.controlPlaneID}'
+```
+
+4. Create an IAM trust policy in your AWS account to match the control plane.
+```yaml
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Principal": {
+ "Federated": "arn:aws:iam:::oidc-provider/"
+ },
+ "Action": "sts:AssumeRoleWithWebIdentity",
+ "Condition": {
+ "StringEquals": {
+ ":aud": "sts.amazonaws.com",
+ ":sub": [
+"system:serviceaccount:mxp--system:external-secrets-controller"]
+ }
+ }
+ }
+ ]
+}
+```
+
+5. Update your Spaces deployment to annotate the SharedSecrets service account
+ with the role ARN.
+```shell
+up space upgrade ... \
+ --set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."eks\.amazonaws\.com/role-arn"=""
+```
+
+6. Create a SharedSecretStore and reference the SharedSecrets service account:
+```ini {copy-lines="all"}
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: aws-sm
+ namespace: default
+spec:
+ provider:
+ aws:
+ service: SecretsManager
+ region:
+ auth:
+ jwt:
+ serviceAccountRef:
+ name: external-secrets-controller
+ controlPlaneSelector:
+ names:
+ -
+ namespaceSelector:
+ names:
+ - default
+```
+
+When you create a `SharedSecretStore` the underlying mechanism:
+
+1. Applies at the group level
+2. Determines which control planes should receive this configuration by the `controlPlaneSelector`
+3. Automatically creates a ClusterSecretStore inside each identified control plane
+4. Maintains a connection in each control plane with the ClusterSecretStore
+ credentials and configuration from the parent SharedSecretStore
+
+Upbound automatically generates a ClusterSecretStore in each matching control
+plane when you create a SharedSecretStore.
+
+```yaml {copy-lines="none"}
+# Automatically created in each matching control plane
+apiVersion: external-secrets.io/v1beta1
+kind: ClusterSecretStore
+metadata:
+ name: aws-secrets # Name matches the parent SharedSecretStore
+spec:
+ provider:
+ upboundspaces:
+ storeRef:
+ name: aws-secret
+```
+
+When you create the SharedSecretStore controller, it replaces the provider with
+a special provider called `upboundspaces`. This provider references the
+SharedSecretStore object in the Spaces API. This avoids copying the actual cloud
+credentials from Spaces to each control plane.
+
+This workflow allows you to configure the store connection only once at the
+group level and automatically propagates to each control plane. Individual control
+planes can use the store without exposure to the group-level configuration and
+updates all child ClusterSecretStores when updated.
+
+
+#### Azure Key Vault
+
+
+:::important
+While the underlying ESO API supports more auth methods, static credentials are currently the only supported auth method in Cloud Spaces.
+:::
+
+##### Static credentials
+
+1. Use the Azure CLI to create a service principal and authentication file.
+2. Create a service principal and save credentials in a file:
+```json
+{
+ "appId": "myAppId",
+ "displayName": "myServicePrincipalName",
+ "password": "myServicePrincipalPassword",
+ "tenant": "myTentantId"
+}
+```
+
+3. Store the credentials as a Kubernetes secret:
+```shell
+kubectl create secret \
+ generic azure-secret-sp \
+ -n default \
+ --from-file=creds=./azure-credentials.json
+```
+
+4. Create a SharedSecretStore referencing these credentials:
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: azure-kv
+spec:
+ provider:
+ azurekv:
+ tenantId: ""
+ vaultUrl: ""
+ authSecretRef:
+ clientId:
+ name: azure-secret-sp
+ key: ClientID
+ clientSecret:
+ name: azure-secret-sp
+ key: ClientSecret
+ controlPlaneSelector:
+ names:
+ -
+ namespaceSelector:
+ names:
+ - default
+```
+
+##### Workload Identity
+
+
+You can also use Entra Workload Identity Federation to access Azure Key Vault
+without needing to manage secrets.
+
+To use Entra Workload ID with AKS:
+
+
+1. Deploy the Spaces software into a [workload identity-enabled AKS cluster][workload-identity-enabled-aks-cluster].
+2. Retrieve the OIDC issuer URL of the AKS cluster:
+```ini
+az aks show --name "" \
+ --resource-group "" \
+ --query "oidcIssuerProfile.issuerUrl" \
+ --output tsv
+```
+
+3. Use the Azure CLI to make a managed identity:
+```ini
+az identity create \
+ --name "" \
+ --resource-group "" \
+ --location "" \
+ --subscription ""
+```
+
+4. Look up the managed identity's client ID:
+```ini
+az identity show \
+ --resource-group "" \
+ --name "" \
+ --query 'clientId' \
+ --output tsv
+```
+
+5. Update your Spaces deployment to annotate the SharedSecrets service account with the associated Entra application client ID from the previous step:
+```ini
+up space upgrade ... \
+ --set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."azure\.workload\.identity/client-id"="" \
+ --set-string controlPlanes.sharedSecrets.pod.customLabels."azure\.workload\.identity/use"="true"
+```
+
+6. Determine the Spaces-generated `controlPlaneID` of your control plane. When you deploy a `kind: controlplane` in a Space, the Spaces software deploys a set of pods in a new namespace following the format `mxp--system`.
+```ini
+kubectl get controlplane -o jsonpath='{.status.controlPlaneID}'
+```
+
+7. Create a federated identity credential.
+```ini
+FEDERATED_IDENTITY_CREDENTIAL_NAME=
+USER_ASSIGNED_IDENTITY_NAME=
+RESOURCE_GROUP=
+AKS_OIDC_ISSUER=
+CONTROLPLANE_ID=
+az identity federated-credential create --name ${FEDERATED_IDENTITY_CREDENTIAL_NAME} --identity-name "${USER_ASSIGNED_IDENTITY_NAME}" --resource-group "${RESOURCE_GROUP}" --issuer "${AKS_OIDC_ISSUER}" --subject system:serviceaccount:"mxp-${CONTROLPLANE_ID}-system:external-secrets-controller" --audience api://AzureADTokenExchange
+```
+
+8. Assign the `Key Vault Secrets User` role to the user-assigned managed identity that you created earlier. This step gives the managed identity permission to read secrets from the key vault:
+```ini
+az role assignment create \
+ --assignee-object-id "${IDENTITY_PRINCIPAL_ID}" \
+ --role "Key Vault Secrets User" \
+ --scope "${KEYVAULT_RESOURCE_ID}" \
+ --assignee-principal-type ServicePrincipal
+```
+
+:::important
+You must manually restart a workload's pod when you add the annotation to the running pod's service account. The Entra workload identity mutating admission webhook requires a restart to inject the necessary environment.
+:::
+
+8. Create a `SharedSecretStore`. Replace `vaultURL` with the URL of your Azure Key Vault instance. Replace `identityId` with the client ID of the managed identity created earlier:
+```yaml {copy-lines="all"}
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: azure-kv
+spec:
+ provider:
+ azurekv:
+ authType: WorkloadIdentity
+ vaultUrl: ""
+ controlPlaneSelector:
+ names:
+ -
+ namespaceSelector:
+ names:
+ - default
+```
+
+
+
+
+#### Google Cloud Secret Manager
+
+
+
+You can configure access to Google Cloud Secret Manager using static credentials or workload identity. Below are instructions for configuring either. See the [ESO provider API][eso-provider-api] for more information.
+
+:::important
+While the underlying ESO API supports more auth methods, static credentials are currently the only supported auth method in Cloud Spaces.
+:::
+
+##### Static credentials
+
+1. Use the [GCP CLI][gcp-cli] to create access credentials.
+2. Save the output in a file called `gcp-credentials.json`.
+3. Store the access credentials in a secret in the same namespace as the `SharedSecretStore`.
+ ```shell {label="kube-create-secret",copy-lines="all"}
+ kubectl create secret \
+ generic gcpsm-secret \
+ -n default \
+ --from-file=creds=./gcp-credentials.json
+ ```
+
+4. Create a `SharedSecretStore`, referencing the secret created earlier. Replace `projectID` with your GCP Project ID:
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: gcp-sm
+spec:
+ provider:
+ gcpsm:
+ auth:
+ secretRef:
+ secretAccessKeySecretRef:
+ name: gcpsm-secret
+ key: creds
+ projectID:
+ controlPlaneSelector:
+ names:
+ -
+ namespaceSelector:
+ names:
+ - default
+```
+
+:::tip
+The example above maps a Shared Secret Store into a single namespace of a single control plane. Read [control plane selection][control-plane-selection] and [namespace selection][namespace-selection] to learn how to map into one or more namespaces of one or more control planes.
+:::
+
+
+##### Workload identity with Service Accounts to IAM Roles
+
+
+To configure, grant the `roles/iam.workloadIdentityUser` role to the Kubernetes
+service account in the control plane namespace to impersonate the IAM service
+account.
+
+1. Ensure you've deployed Spaces on a [Workload Identity Federation-enabled][workload-identity-federation-enabled] GKE cluster.
+2. Determine the Spaces-generated `controlPlaneID` of your control plane. When you deploy a `kind: controlplane` in a Space, the Spaces software deploys a set of pods in a new namespace following the format `mxp--system`.
+```ini
+kubectl get controlplane -o jsonpath='{.status.controlPlaneID}'
+```
+
+3. Create a GCP IAM service account with the [GCP CLI][gcp-cli-1]:
+```ini
+gcloud iam service-accounts create \
+ --project=
+```
+
+4. Grant the IAM service account the role to access GCP Secret Manager:
+```ini
+SA_NAME=
+IAM_SA_PROJECT_ID=
+gcloud projects add-iam-policy-binding IAM_SA_PROJECT_ID \
+ --member "serviceAccount:SA_NAME@IAM_SA_PROJECT_ID.iam.gserviceaccount.com" \
+ --role roles/secretmanager.secretAccessor
+```
+
+5. When you enable the Shared Secrets feature, a service account gets created in each control plane for the External Secrets Operator. Apply a [GCP IAM policy binding][gcp-iam-policy-binding] to associate this service account with the desired GCP IAM role.
+```ini
+PROJECT_ID=
+PROJECT_NUMBER=
+CONTROLPLANE_ID=
+gcloud projects add-iam-policy-binding projects/${PROJECT_ID} \
+ --role "roles/iam.workloadIdentityUser" \
+ --member=principal://iam.googleapis.com/projects/${PROJECT_NUMBER}/locations/global/workloadIdentityPools/${PROJECT_ID}.svc.id.goog/subject/ns/mxp-${CONTROLPLANE_ID}-system/sa/external-secrets-controller
+```
+
+6. Update your Spaces deployment to annotate the SharedSecrets service account with GCP IAM service account's identifier:
+```ini
+up space upgrade ... \
+ --set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."iam\.gke\.io/gcp-service-account"=""
+```
+
+7. Create a `SharedSecretStore`. Replace `projectID` with your GCP Project ID:
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: gcp-sm
+spec:
+ provider:
+ gcpsm:
+ projectID:
+ controlPlaneSelector:
+ names:
+ -
+ namespaceSelector:
+ names:
+ - default
+```
+
+:::tip
+The example above maps a Shared Secret Store into a single namespace of a single control plane. Read [control plane selection][control-plane-selection-1] and [namespace selection][namespace-selection-2] to learn how to map into one or more namespaces of one or more control planes.
+:::
+
+### Manage your secret distribution
+
+After you create your SharedSecretStore, you can define which secrets to
+distribute using SharedExternalSecret:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedExternalSecret
+metadata:
+ name: database-credentials
+ namespace: default
+spec:
+ # Select the same control planes as your SharedSecretStore
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+
+ externalSecretSpec:
+ refreshInterval: 1h
+ secretStoreRef:
+ name: aws-secrets # References the SharedSecretStore name
+ kind: ClusterSecretStore
+ target:
+ name: db-credentials
+ data:
+ - secretKey: username
+ remoteRef:
+ key: prod/database/credentials
+ property: username
+ - secretKey: password
+ remoteRef:
+ key: prod/database/credentials
+ property: password
+```
+
+This configuration:
+
+* Pulls database credentials from your external secret provider
+* Creates secrets in all production control planes
+* Refreshes the secrets every hour
+* Creates a secret called `db-credentials` in each control plane
+
+When you create a SharedExternalSecret at the group level, Upbound's system
+creates a template for the corresponding ClusterExternalSecrets in each selected
+control plane.
+
+The example below simulates the ClusterExternalSecret that Upbound creates:
+
+```yaml
+# Inside each matching control plane:
+apiVersion: external-secrets.io/v1beta1
+kind: ClusterExternalSecret
+metadata:
+ name: database-credentials
+spec:
+ refreshInterval: 1h
+ secretStoreRef:
+ name: aws-secrets
+ kind: ClusterSecretStore
+ data:
+ - secretKey: username
+ remoteRef:
+ key: prod/database/credentials
+ property: username
+```
+
+The hierarchy in this configuration is:
+
+1. SharedExternalSecret (group level) defines what secrets to distribute
+2. ClusterExternalSecret (control plane level) manages the distribution within
+ each control plane
+
+3. Kubernetes Secrets (namespace level) are created in specified namespaces
+
+
+#### Control plane selection
+
+To configure which control planes in a group you want to project a SecretStore into, use the `spec.controlPlaneSelector` field. You can either use `labelSelectors` or the `names` of a control plane directly. A control plane matches if any of the label selectors match.
+
+This example matches all control planes in the group that have `environment: production` as a label:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ environment: production
+```
+
+You can use the more complex `matchExpressions` to match labels based on an expression. This example matches control planes that have label `environment: production` or `environment: staging`:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ controlPlaneSelector:
+ labelSelectors:
+ - matchExpressions:
+ - { key: environment, operator: In, values: [production,staging] }
+```
+
+You can also specify the names of control planes directly:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ controlPlaneSelector:
+ names:
+ - controlplane-dev
+ - controlplane-staging
+ - controlplane-prod
+```
+
+
+#### Namespace selection
+
+To configure which namespaces **within each matched control plane** to project the secret store into, use `spec.namespaceSelector` field. The projected secret store only appears in the namespaces matching the provided selector. You can either use `labelSelectors` or the `names` of namespaces directly. A control plane matches if any of the label selectors match.
+
+**For all control planes matched by** `spec.controlPlaneSelector`, This example matches all namespaces in each selected control plane that have `team: team1` as a label:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ namespaceSelector:
+ labelSelectors:
+ - matchLabels:
+ team: team1
+```
+
+You can use the more complex `matchExpressions` to match labels based on an expression. This example matches namespaces that have label `team: team1` or `team: team2`:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ namespaceSelector:
+ labelSelectors:
+ - matchExpressions:
+ - { key: team, operator: In, values: [team1,team2] }
+```
+
+You can also specify the names of namespaces directly:
+
+```yaml
+apiVersion: spaces.upbound.io/v1alpha1
+kind: SharedSecretStore
+metadata:
+ name: my-secret-store
+spec:
+ namespaceSelector:
+ names:
+ - team1-namespace
+ - team2-namespace
+```
+
+## Configure secrets directly in a control plane
+
+
+The above explains using group-scoped resources to project secrets into multiple control planes. You can also use ESO API types directly in a control plane as you would in standalone Crossplane or Kubernetes.
+
+
+See the [ESO documentation][eso-documentation] for a full guide on using the API types.
+
+## Best practices
+
+When you configure secrets management in your Upbound environment, keep the
+following best practices in mind:
+
+**Use consistent labeling schemes** across your control planes for predictable
+and manageable secret distribution.
+
+**Organize your secrets** in your external provider using a hierarchical
+structure that mirrors your control plane organization.
+
+**Set appropriate refresh intervals** based on your security requires and the
+nature of the secrets.
+
+**Use namespace selection sparingly** to limit secret distribution to only the
+namespaces that need them.
+
+**Use separate tokens for each environment.** Keep them in distinct
+SharedSecretStores. Users could bypass SharedExternalSecret selectors by
+creating ClusterExternalSecrets directly in control planes. This grants access to all
+secrets available to that token.
+
+**Document your secret management architecture**, including which control planes
+should receive which secrets.
+
+[control-plane-selection]: #control-plane-selection
+[namespace-selection]: #namespace-selection
+[control-plane-selection-1]: #control-plane-selection
+[namespace-selection-2]: #namespace-selection
+
+[external-secrets-operator-eso]: https://external-secrets.io
+[workload-identity-enabled-aks-cluster]: https://learn.microsoft.com/en-us/azure/aks/workload-identity-deploy-cluster
+[eso-provider-api]: https://external-secrets.io/latest/provider/google-secrets-manager/
+[gcp-cli]: https://cloud.google.com/iam/docs/creating-managing-service-account-keys
+[workload-identity-federation-enabled]: https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#enable_on_clusters_and_node_pools
+[gcp-cli-1]: https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#kubernetes-sa-to-iam
+[gcp-iam-policy-binding]: https://cloud.google.com/sdk/gcloud/reference/iam/service-accounts/add-iam-policy-binding
+[eso-documentation]: https://external-secrets.io/latest/introduction/getting-started/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/self-hosted-spaces-deployment.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/self-hosted-spaces-deployment.md
new file mode 100644
index 00000000..a783bba1
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/self-hosted-spaces-deployment.md
@@ -0,0 +1,488 @@
+---
+title: Deployment Workflow
+sidebar_position: 3
+description: A quickstart guide for Upbound Spaces
+tier: "business"
+---
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+
+
+This guide deploys a self-hosted Upbound cluster in AWS.
+
+
+
+
+
+This guide deploys a self-hosted Upbound cluster in Azure.
+
+
+
+
+
+This guide deploys a self-hosted Upbound cluster in GCP.
+
+
+
+Disconnected Spaces allows you to host control planes in your preferred environment.
+
+## Prerequisites
+
+To get started deploying your own Disconnected Space, you need:
+
+- An Upbound organization account string, provided by your Upbound account representative
+- A `token.json` license, provided by your Upbound account representative
+
+
+
+- An AWS account and the AWS CLI
+
+
+
+
+
+- An Azure account and the Azure CLI
+
+
+
+
+
+- An GCP account and the GCP CLI
+
+
+
+
+:::important
+Disconnected Spaces are a business critical feature of Upbound and requires a license token to successfully complete the installation. [Contact Upbound][contact-upbound] if you want to try out Upbound with Disconnected Spaces.
+:::
+
+
+## Provision the hosting environment
+
+### Create a cluster
+
+
+
+Configure the name and target region you want the EKS cluster deployed to.
+
+```ini
+export SPACES_CLUSTER_NAME=upbound-space-quickstart
+export SPACES_REGION=us-east-1
+```
+
+Provision a 3-node cluster using eksctl.
+
+```bash
+cat <
+
+
+
+Configure the name and target region you want the AKS cluster deployed to.
+
+```ini
+export SPACES_RESOURCE_GROUP_NAME=upbound-space-quickstart
+export SPACES_CLUSTER_NAME=upbound-space-quickstart
+export SPACES_LOCATION=westus
+```
+
+Provision a new Azure resource group.
+
+```bash
+az group create --name ${SPACES_RESOURCE_GROUP_NAME} --location ${SPACES_LOCATION}
+```
+
+Provision a 3-node cluster.
+
+```bash
+az aks create -g ${SPACES_RESOURCE_GROUP_NAME} -n ${SPACES_CLUSTER_NAME} \
+ --enable-managed-identity \
+ --node-count 3 \
+ --node-vm-size Standard_D4s_v4 \
+ --enable-addons monitoring \
+ --enable-msi-auth-for-monitoring \
+ --generate-ssh-keys \
+ --network-plugin kubenet \
+ --network-policy calico
+```
+
+Get the kubeconfig of your AKS cluster.
+
+```bash
+az aks get-credentials --resource-group ${SPACES_RESOURCE_GROUP_NAME} --name ${SPACES_CLUSTER_NAME}
+```
+
+
+
+
+
+Configure the name and target region you want the GKE cluster deployed to.
+
+```ini
+export SPACES_PROJECT_NAME=upbound-spaces-project
+export SPACES_CLUSTER_NAME=upbound-spaces-quickstart
+export SPACES_LOCATION=us-west1-a
+```
+
+Create a new project and set it as the current project.
+
+```bash
+gcloud projects create ${SPACES_PROJECT_NAME}
+gcloud config set project ${SPACES_PROJECT_NAME}
+```
+
+Provision a 3-node cluster.
+
+```bash
+gcloud container clusters create ${SPACES_CLUSTER_NAME} \
+ --enable-network-policy \
+ --num-nodes=3 \
+ --zone=${SPACES_LOCATION} \
+ --machine-type=e2-standard-4
+```
+
+Get the kubeconfig of your GKE cluster.
+
+```bash
+gcloud container clusters get-credentials ${SPACES_CLUSTER_NAME} --zone=${SPACES_LOCATION}
+```
+
+
+
+## Configure the pre-install
+
+### Set your Upbound organization account details
+
+Set your Upbound organization account string as an environment variable for use in future steps
+
+```ini
+export UPBOUND_ACCOUNT=
+```
+
+### Set up pre-install configurations
+
+Export the path of the license token JSON file provided by your Upbound account representative.
+
+```ini {copy-lines="2"}
+# Change the path to where you saved the token.
+export SPACES_TOKEN_PATH="/path/to/token.json"
+```
+
+Set the version of Spaces software you want to install.
+
+
+```ini
+export SPACES_VERSION="1.16.0"
+```
+
+Set the router host and cluster type. The `SPACES_ROUTER_HOST` is the domain name that's used to access the control plane instances. It's used by the load balancer or ingress to route requests.
+
+```ini
+export SPACES_ROUTER_HOST="proxy.upbound-127.0.0.1.nip.io"
+```
+
+:::important
+Make sure to replace the placeholder text in `SPACES_ROUTER_HOST` and provide a real domain that you own.
+:::
+
+
+## Install the Spaces software
+
+
+### Install cert-manager
+
+Install cert-manager. Replace `` with the [latest release](https://github.com/cert-manager/cert-manager/releases).
+
+```bash
+kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download//cert-manager.yaml
+kubectl wait deployment -n cert-manager cert-manager-webhook --for condition=Available=True --timeout=360s
+```
+
+
+
+### Install AWS Load Balancer Controller
+
+The AWS Load Balancer Controller provisions a Network Load Balancer when you expose the spaces-router Service with the annotations in the next step.
+
+```bash
+helm install aws-load-balancer-controller aws-load-balancer-controller --namespace kube-system \
+ --repo https://aws.github.io/eks-charts \
+ --set clusterName=${SPACES_CLUSTER_NAME} \
+ --set serviceAccount.create=false \
+ --set serviceAccount.name=aws-load-balancer-controller \
+ --wait
+```
+
+
+
+### Expose Spaces with LoadBalancer (recommended)
+
+This guide exposes Spaces using a LoadBalancer Service on the spaces-router. You don't need an ingress or gateway.
+
+:::important
+Use a Network Load Balancer (L4), not an Application Load Balancer (L7). Spaces uses long-lived connections for watch traffic that L7 load balancers may timeout.
+:::
+
+Create a values file using `SPACES_ROUTER_HOST` (or use the same `--set` flags in the Helm install below). Run the command for your cloud:
+
+
+
+```bash
+cat < values.yaml
+externalTLS:
+ host: ${SPACES_ROUTER_HOST}
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ service.beta.kubernetes.io/aws-load-balancer-type: external
+ service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
+ service.beta.kubernetes.io/aws-load-balancer-nlb-target-type: ip
+EOF
+```
+
+
+
+
+
+```bash
+cat < values.yaml
+externalTLS:
+ host: ${SPACES_ROUTER_HOST}
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ # Azure uses L4 by default; add annotations if needed for your setup
+ annotations: {}
+EOF
+```
+
+
+
+
+
+```bash
+cat < values.yaml
+externalTLS:
+ host: ${SPACES_ROUTER_HOST}
+
+router:
+ proxy:
+ service:
+ type: LoadBalancer
+ annotations:
+ cloud.google.com/l4-rbs: enabled
+EOF
+```
+
+
+
+:::tip
+To use Gateway API or Ingress instead of LoadBalancer, see [Exposing Spaces externally][expose].
+:::
+
+### Install Upbound Spaces software
+
+Create an image pull secret so that the cluster can pull Upbound Spaces images.
+
+```bash
+kubectl create ns upbound-system
+kubectl -n upbound-system create secret docker-registry upbound-pull-secret \
+ --docker-server=https://xpkg.upbound.io \
+ --docker-username="$(jq -r .accessId $SPACES_TOKEN_PATH)" \
+ --docker-password="$(jq -r .token $SPACES_TOKEN_PATH)"
+```
+
+Log in with Helm to be able to pull chart images for the installation commands.
+
+```bash
+jq -r .token $SPACES_TOKEN_PATH | helm registry login xpkg.upbound.io -u $(jq -r .accessId $SPACES_TOKEN_PATH) --password-stdin
+```
+
+Install the Spaces software. Use the `values.yaml` file you created in the previous step (with `externalTLS.host` and `router.proxy.service`).
+
+```bash
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ -f values.yaml \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "authentication.hubIdentities=true" \
+ --set "authorization.hubRBAC=true" \
+ --wait
+```
+
+### Create a DNS record
+
+:::important
+Create a DNS record for the spaces-router load balancer before you create your first control plane.
+:::
+
+Get the load balancer address for the spaces-router Service:
+
+
+
+```bash
+kubectl get svc -n upbound-system spaces-router \
+ -o jsonpath='{.status.loadBalancer.ingress[0].hostname}'
+```
+
+
+
+
+
+```bash
+kubectl get svc -n upbound-system spaces-router \
+ -o jsonpath='{.status.loadBalancer.ingress[0].ip}'
+```
+
+
+
+
+
+```bash
+kubectl get svc -n upbound-system spaces-router \
+ -o jsonpath='{.status.loadBalancer.ingress[0].ip}'
+```
+
+
+
+If the preceding command doesn't return a load balancer address then your
+provider may not have allocated it yet. Once it's available, add a DNS record
+for the `ROUTER_HOST` to point to the given load balancer address. If it's an
+IPv4 address, add an A record. If it's a domain name, add a CNAME record.
+
+## Configure the up CLI
+
+With your kubeconfig pointed at the Kubernetes cluster where you installed
+Upbound Spaces, create a new profile in the `up` CLI. This profile interacts
+with your Space:
+
+```bash
+up profile create --use ${SPACES_CLUSTER_NAME} --type=disconnected --organization ${UPBOUND_ACCOUNT}
+```
+
+Optionally, log in to your Upbound account using the new profile so you can use the Upbound Marketplace with this profile as well:
+
+```bash
+up login
+```
+
+
+## Connect to your Space
+
+
+Use `up ctx` to create a kubeconfig context pointed at your new Space:
+
+```bash
+up ctx disconnected/$(kubectl config current-context)
+```
+
+## Create your first control plane
+
+You can now create a control plane with the `up` CLI:
+
+```bash
+up ctp create ctp1
+```
+
+You can also create a control plane with kubectl:
+
+```yaml
+cat <
+Connect to your control plane with the up ctx command. With your kubeconfig
+still pointed at the Kubernetes cluster where you installed the Upbound Space,
+run the following:
+
+
+
+```bash
+up ctx ./default/ctp1
+```
+
+This command updates your current kubectl context. You're now connected to your control plane directly. Confirm this is the case by trying to list the CRDs in your control plane:
+
+```bash
+kubectl get crds
+```
+
+To disconnect from your control plane and switch back to your previous context:
+
+```bash
+up ctx -
+```
+
+:::tip
+Learn how to use the up CLI to navigate around Upbound by reading the [up ctx command reference][up-ctx-command-reference].
+:::
+
+[up-ctx-command-reference]: /reference/cli-reference
+[contact-upbound]: https://www.upbound.io/contact-us
+[expose]: /self-hosted-spaces/howtos/ingress/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/simulations.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/simulations.md
new file mode 100644
index 00000000..c102f2de
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/simulations.md
@@ -0,0 +1,105 @@
+---
+title: Simulate changes to your Control Plane Projects
+sidebar_position: 100
+description: Use the Up CLI to mock operations before deploying to your environments.
+---
+
+
+:::important
+The Simulations feature is in private preview. For more information, [reach out to Upbound][reach-out-to-upbound].
+:::
+
+Control plane simulations allow you to preview changes to your resources before
+applying them to your control planes. Like a plan or dry-run operation,
+simulations expose the impact of updates to compositions or claims without
+changing your actual resources.
+
+A control plane simulation creates a temporary copy of your control plane and
+returns a preview of the desired changes. The simulation change plan helps you
+reduce the risk of unexpected behavior based on your changes.
+
+## Simulation benefits
+
+Control planes are dynamic systems that automatically reconcile resources to
+match your desired state. Simulations provide visibility into this
+reconciliation process by showing:
+
+
+* New resources to create
+* Existing resources to change
+* Existing resources to delete
+* How configuration changes propagate through the system
+
+These insights are crucial when planning complex changes or upgrading Crossplane
+packages.
+
+## Requirements
+
+Simulations are available to select customers on Upbound Cloud with Team
+Tier or higher. For more information, [reach out to Upbound][reach-out-to-upbound-1].
+
+## How to simulate your control planes
+
+Before you start a simulation, build your project and use the `up
+project run` command to run your control plane.
+
+Use the `up project simulate` command with your control plane name to start the
+simulation:
+
+```ini {copy-lines="all"}
+up project simulate --complete-after=60s --terminate-on-finish
+```
+
+The `complete-after` flag determines how long to run the simulation before it completes and calculates the results. Depending on the change, a simulation may not complete within your defined interval leaving unaffected resources as `unchanged`.
+
+The `terminate-on-finish` flag terminates the simulation after the time
+you set - deleting the control plane that ran the simulation.
+
+At the end of your simulation, your CLI returns:
+* A summary of the resources created, modified, or deleted
+* Diffs for each resource affected
+
+## View your simulation in the Upbound Console
+You can also view your simulation results in the Upbound Console:
+
+1. Navigate to your base control plane in the Upbound Console
+2. Select the "Simulations" tab in the menu
+3. Select a simulation object for a change list of all
+ resources affected.
+
+The Console provides visual indications of changes:
+
+- Created Resources: Marked with green
+- Modified Resources: Marked with yellow
+- Deleted Resources: Marked with red
+- Unchanged Resources: Displayed in gray
+
+
+
+## Considerations
+
+Simulations is a **private preview** feature.
+
+Be aware of the following limitations:
+
+- Simulations can't predict the exact behavior of external systems due to the
+ complexity and non-deterministic reconciliation pattern in Crossplane.
+
+- The only completion criteria for a simulation is time. Your simulation may not
+ receive a conclusive result within that interval. Upbound recommends the
+ default `60s` value.
+
+- Providers don't run in simulations. Simulations can't compose resources that
+ rely on the status of Managed Resources.
+
+
+The Upbound team is working to improve these limitations. Your feedback is always appreciated.
+
+## Next steps
+
+For more information, follow the [tutorial][tutorial] on Simulations.
+
+
+[tutorial]: /manuals/cli/howtos/simulations
+[reach-out-to-upbound]: https://www.upbound.io/contact-us
+[reach-out-to-upbound-1]: https://www.upbound.io/contact-us
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/space-observability.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/space-observability.md
new file mode 100644
index 00000000..f53afe54
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/space-observability.md
@@ -0,0 +1,454 @@
+---
+title: Configure Space-level observability
+sidebar_position: 30
+description: Configure Space-level observability
+---
+
+:::important
+This feature is GA since `v1.14.0`, requires Spaces `v1.6.0`, and is off by default. To enable, set `observability.enabled=true` (`features.alpha.observability.enabled=true` before `v1.14.0`) when installing Spaces:
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "observability.enabled=true" \
+```
+:::
+
+
+The observability feature collects telemetry data from user-facing control
+plane workloads like:
+
+* Crossplane
+* Providers
+* Functions
+
+Self-hosted Spaces users can add control plane system workloads such as the
+`api-server`, `etcd` by setting the
+`observability.collectors.includeSystemTelemetry` Helm flag to true.
+
+### Sensitive data
+
+To avoid exposing sensitive data in the `SharedTelemetryConfig` resource, use
+Kubernetes secrets to store the sensitive data and reference the secret in the
+`SharedTelemetryConfig` resource.
+
+Create the secret in the same namespace/group as the `SharedTelemetryConfig`
+resource. The example below uses `kubectl create secret` to create a new secret:
+
+```bash
+kubectl create secret generic sensitive -n \
+ --from-literal=apiKey='YOUR_API_KEY'
+```
+
+Next, reference the secret in the `SharedTelemetryConfig` resource:
+
+```yaml
+apiVersion: observability.spaces.upbound.io/v1alpha1
+kind: SharedTelemetryConfig
+metadata:
+ name: newrelic
+spec:
+ configPatchSecretRefs:
+ - name: sensitive
+ key: apiKey
+ path: exporters.otlphttp.headers.api-key
+ controlPlaneSelector:
+ labelSelectors:
+ - matchLabels:
+ org: foo
+ exporters:
+ otlphttp:
+ endpoint: https://otlp.nr-data.net
+ headers:
+ api-key: dummy # This value is replaced by the secret value, can be omitted
+ exportPipeline:
+ metrics: [otlphttp]
+ traces: [otlphttp]
+ logs: [otlphttp]
+```
+
+The `configPatchSecretRefs` field in the `spec` specifies the secret `name`,
+`key`, and `path` values to inject the secret value in the
+`SharedTelemetryConfig` resource.
+
+
+This guide explains how to configure Space-level observability. This feature is
+only applicable to self-hosted Space administrators. This lets Space
+administrators observe the cluster infrastructure where the Space software gets
+installed.
+
+
+When you enable observability in a Space, Upbound deploys a single
+[OpenTelemetry Collector][opentelemetry-collector] to collect and export metrics,
+logs, and traces to your configured observability backends.
+
+
+## Prerequisites
+
+This feature requires the [OpenTelemetry Operator][opentelemetry-operator] on
+the Space cluster.
+
+Note: If running Spaces v1.16 or later, use OpenTelemetry Operator v0.139.0 or
+later due to breaking changes in the OpenTelemetry Operator.
+
+## Configuration
+
+To configure how Upbound exports telemetry, review the `spacesCollector` value in
+your Space installation Helm chart. Supported exporters are `otlphttp`, `datadog`,
+`splunk_hec`, and `debug`. Replace the exporter name and configuration options
+based on your backend.
+
+
+Below is an example using `otlphttp`.
+
+
+
+```yaml
+observability:
+ spacesCollector:
+ env:
+ - name: API_KEY
+ valueFrom:
+ secretKeyRef:
+ name: my-secret
+ key: api-key
+ config:
+ exporters:
+ otlphttp:
+ endpoint: ""
+ headers:
+ api-key: ${env:API_KEY}
+ exportPipeline:
+ logs:
+ - otlphttp
+ metrics:
+ - otlphttp
+ traces:
+ - otlphttp
+```
+
+
+
+For exporter-specific configuration options, see the OpenTelemetry documentation
+for [`otlphttp`][otlphttp-exporter], [`datadog`][datadog-exporter], and
+[`splunk_hec`][splunk-exporter].
+
+
+You can export metrics, logs, and traces from your Crossplane installation, Spaces
+infrastructure (controller, API, router, etc.), provider-helm, and
+provider-kubernetes.
+
+### Router metrics
+
+The Spaces router component uses Envoy as a reverse proxy and exposes detailed
+metrics about request handling, circuit breakers, and connection pooling.
+Upbound collects these metrics in your Space after you enable Space-level
+observability.
+
+Envoy metrics in Upbound include:
+
+- **Upstream cluster metrics** - Request status codes, timeouts, retries, and latency for traffic to control planes and services
+- **Circuit breaker metrics** - Connection and request circuit breaker state for both `DEFAULT` and `HIGH` priority levels
+- **Downstream listener metrics** - Client connections and requests received
+- **HTTP connection manager metrics** - End-to-end HTTP request processing and latency
+
+For a complete list of available router metrics and example PromQL queries, see the [Router metrics reference][router-ref].
+
+### Distributed tracing
+
+Spaces generates distributed traces through OpenTelemetry integration,
+providing end-to-end visibility into request flow across the system. Use these
+traces to debug latency issues, understand request paths, and correlate errors
+across services.
+
+The router uses:
+
+- **Protocol**: OTLP (OpenTelemetry Protocol) over gRPC
+- **Service name**: `spaces-router`
+- **Transport**: TLS-encrypted connection to telemetry collector
+
+#### Trace configuration
+
+Enable tracing and configure the sampling rate with the following Helm values:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ sampling:
+ rate: 0.1 # Sample 10% of new traces (0.0-1.0)
+```
+
+The sampling behavior depends on whether a parent trace context exists:
+
+- **With parent context**: If a `traceparent` header is present, the parent's
+ sampling decision is respected, enabling proper distributed tracing across services.
+- **Root spans**: For new traces without a parent, Envoy samples based on
+ `x-request-id` hashing. The default sampling rate is 10%.
+
+#### TLS configuration for external collectors
+
+To send traces to an external OTLP collector, configure the endpoint and TLS settings:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ endpoint: "otlp-gateway.example.com"
+ port: 443
+ tls:
+ caBundleSecretRef: "custom-ca-secret"
+```
+
+If `caBundleSecretRef` is set, the router uses the CA bundle from the referenced
+Kubernetes secret. The secret must contain a key named `ca.crt` with the
+PEM-encoded CA bundle. If not set, the router uses the Spaces CA for the
+in-cluster collector.
+
+#### Custom trace tags
+
+The router adds custom tags to every span to enable filtering and grouping by
+control plane:
+
+| Tag | Source | Description |
+|-----|--------|-------------|
+| `controlplane.id` | `x-upbound-mxp-id` header | Control plane UUID |
+| `controlplane.name` | `x-upbound-mxp-host` header | Internal vcluster hostname |
+| `hostcluster.id` | `x-upbound-hostcluster-id` header | Host cluster identifier |
+
+These tags enable queries like "show all slow requests to control plane X" or
+"find errors for control planes in host cluster Y."
+
+#### Example trace
+
+The following example shows the attributes from a successful GET request:
+
+```text
+Span: ingress
+├─ Service: spaces-router
+├─ Duration: 8.025ms
+├─ Attributes:
+│ ├─ http.method: GET
+│ ├─ http.status_code: 200
+│ ├─ upstream_cluster: ctp-b2b37aaa-ee55-492c-ba0c-4d561a6325fa-api-cluster
+│ ├─ controlplane.id: b2b37aaa-ee55-492c-ba0c-4d561a6325fa
+│ ├─ controlplane.name: vcluster.mxp-b2b37aaa-ee55-492c-ba0c-4d561a6325fa-system
+│ └─ response_size: 1827
+```
+The router uses:
+
+- **Protocol**: OTLP (OpenTelemetry Protocol) over gRPC
+- **Service name**: `spaces-router`
+- **Transport**: TLS-encrypted connection to telemetry collector
+
+#### Trace configuration
+
+Enable tracing and configure the sampling rate with the following Helm values:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ sampling:
+ rate: 0.1 # Sample 10% of new traces (0.0-1.0)
+```
+
+The sampling behavior depends on whether a parent trace context exists:
+
+- **With parent context**: If a `traceparent` header is present, the parent's
+ sampling decision is respected, enabling proper distributed tracing across services.
+- **Root spans**: For new traces without a parent, Envoy samples based on
+ `x-request-id` hashing. The default sampling rate is 10%.
+
+#### TLS configuration for external collectors
+
+To send traces to an external OTLP collector, configure the endpoint and TLS settings:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ endpoint: "otlp-gateway.example.com"
+ port: 443
+ tls:
+ caBundleSecretRef: "custom-ca-secret"
+```
+
+If `caBundleSecretRef` is set, the router uses the CA bundle from the referenced
+Kubernetes secret. The secret must contain a key named `ca.crt` with the
+PEM-encoded CA bundle. If not set, the router uses the Spaces CA for the
+in-cluster collector.
+
+#### Custom trace tags
+
+The router adds custom tags to every span to enable filtering and grouping by
+control plane:
+
+| Tag | Source | Description |
+|-----|--------|-------------|
+| `controlplane.id` | `x-upbound-mxp-id` header | Control plane UUID |
+| `controlplane.name` | `x-upbound-mxp-host` header | Internal vcluster hostname |
+| `hostcluster.id` | `x-upbound-hostcluster-id` header | Host cluster identifier |
+
+These tags enable queries like "show all slow requests to control plane X" or
+"find errors for control planes in host cluster Y."
+
+#### Example trace
+
+The following example shows the attributes from a successful GET request:
+
+```text
+Span: ingress
+├─ Service: spaces-router
+├─ Duration: 8.025ms
+├─ Attributes:
+│ ├─ http.method: GET
+│ ├─ http.status_code: 200
+│ ├─ upstream_cluster: ctp-b2b37aaa-ee55-492c-ba0c-4d561a6325fa-api-cluster
+│ ├─ controlplane.id: b2b37aaa-ee55-492c-ba0c-4d561a6325fa
+│ ├─ controlplane.name: vcluster.mxp-b2b37aaa-ee55-492c-ba0c-4d561a6325fa-system
+│ └─ response_size: 1827
+```
+For detailed tracing configuration, custom tags, and example traces for each
+component, see the [distributed tracing documentation](tracing/overview.md).
+
+## Available metrics
+
+Space-level observability collects metrics from multiple infrastructure components:
+
+### Infrastructure component metrics
+
+- Crossplane controller metrics
+- Spaces controller, API, and router metrics
+- Provider metrics (provider-helm, provider-kubernetes)
+
+### Router metrics
+
+The router component exposes Envoy proxy metrics for monitoring traffic flow and
+service health. Key metric categories include:
+
+- `envoy_cluster_upstream_rq_*` - Upstream request metrics (status codes, timeouts, retries, latency)
+- `envoy_cluster_circuit_breakers_*` - Circuit breaker state and capacity
+- `envoy_listener_downstream_*` - Client connection and request metrics
+- `envoy_http_downstream_*` - HTTP request processing metrics
+
+Example query to monitor total request rate:
+
+```promql
+sum(rate(envoy_cluster_upstream_rq_total{job="spaces-router-envoy"}[5m]))
+```
+
+Example query for P95 latency:
+
+```promql
+histogram_quantile(
+ 0.95,
+ sum by (le) (
+ rate(envoy_cluster_upstream_rq_time_bucket{job="spaces-router-envoy"}[5m])
+ )
+)
+```
+
+For detailed router metrics documentation and more query examples, see the [Router metrics reference][router-ref].
+
+
+## OpenTelemetryCollector image
+
+
+Control plane (`SharedTelemetry`) and Space observability deploy the same custom
+OpenTelemetry Collector image. The OpenTelemetry Collector image supports
+`otlphttp`, `datadog`, `splunk_hec`, and `debug` exporters.
+
+For more information on observability configuration, review the [Helm chart reference][helm-chart-reference].
+
+## Observability in control planes
+
+Read the [observability documentation][observability-documentation] to learn
+about the features Upbound offers for collecting telemetry from control planes.
+
+
+## Router metrics reference {#router-ref}
+
+To avoid overwhelming observability tools with hundreds of Envoy metrics, an
+allow-list filters metrics to only the following metric families.
+
+### Upstream cluster metrics
+
+Metrics tracking requests sent from Envoy to configured upstream clusters.
+Individual control planes, spaces-api, and other services are each considered
+an upstream cluster. Use these metrics to monitor service health, identify
+upstream errors, and measure backend latency.
+
+| Metric | Description |
+|--------|-------------|
+| `envoy_cluster_upstream_rq_xx_total` | HTTP status codes (2xx, 3xx, 4xx, 5xx) with label `envoy_response_code_class` |
+| `envoy_cluster_upstream_rq_timeout_total` | Requests that timed out waiting for upstream |
+| `envoy_cluster_upstream_rq_retry_limit_exceeded_total` | Requests that exhausted retry attempts |
+| `envoy_cluster_upstream_rq_total` | Total upstream requests |
+| `envoy_cluster_upstream_rq_time_bucket` | Latency histogram (for P50/P95/P99 calculations) |
+| `envoy_cluster_upstream_rq_time_sum` | Sum of request durations |
+| `envoy_cluster_upstream_rq_time_count` | Count of requests |
+
+### Circuit breaker metrics
+
+
+
+Metrics tracking circuit breaker state and remaining capacity. Circuit breakers
+prevent cascading failures by limiting connections and concurrent requests to
+unhealthy upstreams. Two priority levels exist: `DEFAULT` for watch requests and
+`HIGH` for API requests.
+
+
+| Name | Description |
+|--------|-------------|
+| `envoy_cluster_circuit_breakers_default_cx_open` | `DEFAULT` priority connection circuit breaker open (gauge) |
+| `envoy_cluster_circuit_breakers_default_rq_open` | `DEFAULT` priority request circuit breaker open (gauge) |
+| `envoy_cluster_circuit_breakers_default_remaining_cx` | Available `DEFAULT` priority connections (gauge) |
+| `envoy_cluster_circuit_breakers_default_remaining_rq` | Available `DEFAULT` priority request slots (gauge) |
+| `envoy_cluster_circuit_breakers_high_cx_open` | `HIGH` priority connection circuit breaker open (gauge) |
+| `envoy_cluster_circuit_breakers_high_rq_open` | `HIGH` priority request circuit breaker open (gauge) |
+| `envoy_cluster_circuit_breakers_high_remaining_cx` | Available `HIGH` priority connections (gauge) |
+| `envoy_cluster_circuit_breakers_high_remaining_rq` | Available `HIGH` priority request slots (gauge) |
+
+### Downstream listener metrics
+
+Metrics tracking requests received from clients such as kubectl and API consumers.
+Use these metrics to monitor client connection patterns, total request volume,
+and responses sent to external users.
+
+| Name | Description |
+|--------|-------------|
+| `envoy_listener_downstream_rq_xx_total` | HTTP status codes for responses sent to clients |
+| `envoy_listener_downstream_rq_total` | Total requests received from clients |
+| `envoy_listener_downstream_cx_total` | Total connections from clients |
+| `envoy_listener_downstream_cx_active` | Currently active client connections (gauge) |
+
+
+
+### HTTP connection manager metrics
+
+
+Metrics from Envoy's HTTP connection manager tracking end-to-end request
+processing. These metrics provide a comprehensive view of the HTTP request
+lifecycle including status codes and client-perceived latency.
+
+| Name | Description |
+|--------|-------------|
+| `envoy_http_downstream_rq_xx` | HTTP status codes (note: no `_total` suffix for this metric family) |
+| `envoy_http_downstream_rq_total` | Total HTTP requests received |
+| `envoy_http_downstream_rq_time_bucket` | Downstream request latency histogram |
+| `envoy_http_downstream_rq_time_sum` | Sum of downstream request durations |
+| `envoy_http_downstream_rq_time_count` | Count of downstream requests |
+
+[router-ref]: #router-ref
+[observability-documentation]: /self-hosted-spaces/howtos/observability
+[opentelemetry-collector]: https://opentelemetry.io/docs/collector/
+[opentelemetry-operator]: https://opentelemetry.io/docs/kubernetes/operator/
+[helm-chart-reference]: /reference/spaces-helm-reference/
+[otlphttp-exporter]: https://github.com/open-telemetry/opentelemetry-collector/tree/main/exporter/otlphttpexporter
+[datadog-exporter]: https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/exporter/datadogexporter
+[splunk-exporter]: https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/exporter/splunkhecexporter
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/spaces-management.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/spaces-management.md
new file mode 100644
index 00000000..67fee932
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/spaces-management.md
@@ -0,0 +1,213 @@
+---
+title: Interacting with Disconnected Spaces
+sidebar_position: 10
+description: Common operations in Spaces
+---
+
+## Spaces management
+
+### Create a Space
+
+To install an Upbound Space into a cluster, it's recommended you dedicate an entire Kubernetes cluster for the Space. You can use [up space init][up-space-init] to install an Upbound Space. Below is an example:
+
+```bash
+up space init "v1.9.0"
+```
+:::tip
+For a full guide to get started with Spaces, read the [quickstart][quickstart] guide:
+:::
+
+You can also install the helm chart for Spaces directly. In order for a Spaces install to succeed, you must install some prerequisites first and configure them. This includes:
+
+- UXP
+- provider-helm and provider-kubernetes
+- cert-manager
+
+Furthermore, the Spaces chart requires a pull secret, which Upbound must provide to you.
+
+```bash
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "v1.9.0" \
+ --set "ingress.host=your-host.com" \
+ --set "clusterType=eks" \
+ --set "account=your-upbound-account" \
+ --wait
+```
+For a complete helm install tutorial, read the deployment guides for [AWS][aws], [Azure][azure], or [GCP][gcp].
+
+### Upgrade a Space
+
+To upgrade a Space from one version to the next, use [up space upgrade][up-space-upgrade]. Spaces supports upgrading from version `ver x.N.*` to version `ver x.N+1.*`.
+
+```bash
+up space upgrade "v1.9.0"
+```
+
+You can also upgrade a Space by manually bumping the Helm chart version. Before
+upgrading, review the release notes for any breaking changes or
+special requirements:
+
+1. Review the release notes for the target version in the [Spaces Release Notes][spaces-release-notes]
+2. Upgrade the Space by updating the helm chart version:
+
+```bash
+helm -n upbound-system upgrade spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "v1.9.0" \
+ --reuse-values \
+ --wait
+```
+
+For major version upgrades or configuration changes, extract your current values
+and adjust:
+
+```bash
+# Extract current values to a file
+helm -n upbound-system get values spaces > spaces-values.yaml
+
+# Upgrade with modified values
+helm -n upbound-system upgrade spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "v1.9.0" \
+ -f spaces-values.yaml \
+ --wait
+```
+
+### Downgrade a Space
+
+To rollback a Space from one version to the previous, use [up space upgrade][up-space-upgrade-1]. Spaces supports downgrading from version `ver x.N.*` to version `ver x.N-1.*`.
+
+```bash
+up space upgrade --rollback
+```
+
+You can also downgrade a Space manually using Helm by specifying an earlier version:
+
+```bash
+helm -n upbound-system upgrade spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "v1.8.0" \
+ --reuse-values \
+ --wait
+```
+
+When downgrading, make sure to:
+1. Check the [release notes][release-notes] for specific downgrade instructions
+2. Verify compatibility between the downgraded Space and any control planes
+3. Back up any critical data before proceeding
+
+### Uninstall a Space
+
+To uninstall a Space from a Kubernetes cluster, use [up space destroy][up-space-destroy]. A destroy operation uninstalls core components and orphans control planes and their associated resources.
+
+```bash
+up space destroy
+```
+
+## Control plane management
+
+You can manage control planes in a Space via the [up CLI][up-cli] or the Spaces-local Kubernetes API. When you install a Space, it defines new a API type, `kind: Controlplane`, that you can use to create and manage control planes in the Space.
+
+### Create a control plane
+
+To create a control plane in a Space using `up`, run the following:
+
+```bash
+up ctp create ctp1
+```
+
+You can also declare a new control plane like the example below and apply it to your Spaces cluster:
+
+```yaml
+apiVersion: spaces.upbound.io/v1beta1
+kind: ControlPlane
+metadata:
+ name: ctp1
+ namespace: default
+spec:
+ writeConnectionSecretToRef:
+ name: kubeconfig-ctp1
+ namespace: default
+```
+
+This manifest:
+
+- Creates a new control plane in the space called `ctp1`.
+- Publishes the kubeconfig to connect to the control plane to a secret in the Spaces cluster, called `kubeconfig-ctp1`
+
+### Connect to a control plane
+
+To connect to a control plane in a Space using `up`, run the following:
+
+```bash
+up ctx ./default/ctp1
+```
+
+The command changes your kubeconfig's current context to the control plane you specify. If you want to change your kubeconfig back to a previous context, run:
+
+```bash
+up ctx -
+```
+
+If you configured your control plane to publish connection details, you can also access it this way. Once the control plane is ready, use the secret (containing connection details) to connect to the API server of your control plane.
+
+```bash
+kubectl get secret -n default -o jsonpath='{.data.kubeconfig}' | base64 -d > /tmp/.yaml
+```
+
+Reference the kubeconfig whenever you want to interact directly with the API server of the control plane (vs the Space's API server):
+
+```bash
+kubectl get providers --kubeconfig=/tmp/.yaml
+```
+
+### Configure a control plane
+
+Spaces offers a built-in feature that allows you to connect a control plane to a Git source. This experience is like when a control plane runs in [Upbound's SaaS environment][upbound-s-saas-environment]. Upbound recommends using the built-in Git integration to drive configuration of your control planes in a Space.
+
+Learn more in the [Spaces Git integration][spaces-git-integration] documentation.
+
+### List control planes
+
+To list all control planes in a Space using `up`, run the following:
+
+```bash
+up ctp list
+```
+
+Or you can use Kubernetes-style semantics to list the control plane:
+
+```bash
+kubectl get controlplanes
+```
+
+
+### Delete a control plane
+
+To delete a control plane in a Space using `up`, run the following:
+
+```bash
+up ctp delete ctp1
+```
+
+Or you can use Kubernetes-style semantics to delete the control plane:
+
+```bash
+kubectl delete controlplane ctp1
+```
+
+
+[up-space-init]: /reference/cli-reference
+[quickstart]: /
+[aws]: /self-hosted-spaces/howtos/self-hosted-spaces-deployment
+[azure]:/self-hosted-spaces/howtos/self-hosted-spaces-deployment
+[gcp]:/self-hosted-spaces/howtos/self-hosted-spaces-deployment
+[up-space-upgrade]: /reference/cli-reference
+[spaces-release-notes]: /reference/release-notes/spaces
+[up-space-upgrade-1]: /reference/cli-reference
+[release-notes]: /reference/release-notes/spaces
+[up-space-destroy]: /reference/cli-reference
+[up-cli]: /reference/cli-reference
+[upbound-s-saas-environment]: /self-hosted-spaces/howtos/gitops
+[spaces-git-integration]: /self-hosted-spaces/howtos/gitops
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/_category_.json b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/_category_.json
new file mode 100644
index 00000000..6d3366ad
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/_category_.json
@@ -0,0 +1,8 @@
+{
+ "label": "Distributed Tracing",
+ "position": 50,
+ "collapsed": true,
+ "customProps": {
+ "plan": "business"
+ }
+}
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/overview.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/overview.md
new file mode 100644
index 00000000..b9740d12
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/overview.md
@@ -0,0 +1,91 @@
+---
+title: Distributed Tracing Overview
+sidebar_position: 1
+description: Configure distributed tracing in Spaces for end-to-end request visibility.
+---
+
+Spaces uses distributed tracing to provide end-to-end visibility into request
+flow across the system. Traces help with debugging performance issues,
+understanding request patterns, and correlating operations across multiple
+services.
+
+## Architecture
+
+The Spaces tracing architecture consists of:
+
+- **Instrumented components**: spaces-router, spaces-api, and query-api
+- **Protocol**: OTLP (OpenTelemetry Protocol)
+- **Collector**: telemetry-spaces-collector (in-cluster by default), with
+ support for bringing your own collector
+
+## Enabling tracing
+
+Configure tracing through Helm values when installing or upgrading Spaces:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ sampling:
+ rate: 0.1 # Sample 10% of new traces (0.0-1.0)
+```
+
+## Sampling strategy
+
+All components use **parent-based sampling**:
+
+
+- **With parent context**: If a `traceparent` header is present, the system
+ respects the parent's sampling decision, enabling proper distributed tracing
+ across services.
+- **Root spans**: For new traces without a parent, the system samples based on
+ the configured rate. The default sampling rate is 10%.
+
+
+## TLS configuration
+
+### In-cluster collector (default)
+
+By default, components connect to the in-cluster telemetry collector using the
+Spaces CA. No extra TLS configuration is needed:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+```
+
+### External collectors
+
+To send traces to an external OTLP collector, configure a custom endpoint and
+CA bundle:
+
+```yaml
+observability:
+ enabled: true
+ tracing:
+ enabled: true
+ endpoint: "otel-collector.monitoring"
+ port: 443
+ tls:
+ # The secret must contain a key named 'ca.crt' with the PEM-encoded
+ # CA bundle
+ caBundleSecretRef: "otel-collector-ca"
+```
+
+
+When you set `caBundleSecretRef`, components use the CA bundle from the
+referenced Kubernetes secret. When not set, components use the Spaces CA for the
+in-cluster collector.
+
+
+## Component-specific tracing
+
+Each component adds custom attributes for filtering and correlation. See the
+component-specific documentation for details:
+
+- [Spaces Router traces](spaces-router.md) - reverse proxy routing to control planes
+- [Spaces API traces](spaces-api.md) - Spaces resource management API
+- [Query API traces](query-api.md) - cross-control plane query service
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/query-api.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/query-api.md
new file mode 100644
index 00000000..b4daf840
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/query-api.md
@@ -0,0 +1,89 @@
+---
+title: Query API Traces
+sidebar_position: 30
+description: Distributed tracing details for the Query API (Apollo) component.
+---
+
+Query API (Apollo) provides querying capabilities for Kubernetes resources
+across multiple Crossplane control planes.
+
+For common tracing configuration, see the
+[distributed tracing overview](overview.md).
+
+## Overview
+
+Service name: **`spaces-apollo`**
+
+Each request generates three span types:
+
+- Router ingress (routes to Apollo cluster)
+- Apollo HTTP (processes query)
+- PostgreSQL (executes SQL)
+
+## Architecture
+
+Requests flow through Spaces Router to Apollo:
+
+```text
+Client → Spaces Router → Apollo (Query API) → PostgreSQL
+ │ │ │ │
+ └───────────────────────────────────────────────→ Single Trace
+```
+
+Each request produces four spans:
+
+1. **Router ingress** - Envoy routes to `spaces-apollo` cluster
+2. **Auth check** - External authorization validates request
+3. **Apollo HTTP** - Query API processes request (service.name: `spaces-apollo`)
+4. **PostgreSQL** - Database executes SQL
+
+### Enabling tracing
+
+Configure Query API tracing via Helm values:
+
+```yaml
+apollo:
+ apollo:
+ observability:
+ enabled: true
+ tracing:
+ enabled: true
+ endpoint: "telemetry-spaces-collector.upbound-system.svc.cluster.local"
+ insecure: false
+ port: 4317
+ sampling:
+ rate: 0.1 # 10%
+ tls:
+ caBundleSecretRef: spaces-ca
+```
+
+## Custom tags
+
+### Apollo spans
+
+Apollo exports spans with `service.name: query-api` and includes:
+
+| Attribute | Description | Example Value |
+|-----------|-------------|---------------|
+| `http.request.method` | HTTP method | `POST` |
+| `url.path` | Request path | `/apis/query.spaces.upbound.io/v1alpha2/namespaces/default/queries` |
+| `http.response.status_code` | Status code | `200` |
+| `http.request.body.size` | Request size | `360` |
+| `http.response.body.size` | Response size | `3702` |
+| `server.address` | Server hostname | `127.0.0.1` |
+| `network.peer.address` | Client IP | `192.168.2.11` |
+| `user_agent.original` | User agent | `up-cli/v0.40.0 (darwin; arm64)` |
+
+### Database spans
+
+Database spans include PostgreSQL connection pool metrics:
+
+| Attribute | Description | Example Value |
+|-----------|-------------|---------------|
+| `db.system` | Database system | `postgresql` |
+| `db.name` | Database name | `upbound` |
+| `db.operation` | Operation type | `query` |
+| `db.statement` | SQL query | Full SQL statement |
+| `db.pool.total_conns` | Total connections | `1` |
+| `db.pool.idle_conns` | Idle connections | `1` |
+| `db.pool.acquired_conns` | Acquired connections | `0` |
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-api.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-api.md
new file mode 100644
index 00000000..04745391
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-api.md
@@ -0,0 +1,25 @@
+---
+title: Spaces API Traces
+sidebar_position: 20
+description: Distributed tracing details for the Spaces API component.
+---
+
+The Spaces API is the API server for managing Spaces resources
+(ControlPlanes, SharedBackupConfigs, etc.) on the host cluster.
+
+For common tracing configuration, see the
+[distributed tracing overview](overview.md).
+
+## Overview
+
+The Spaces API implements distributed tracing using **service.name**:
+`spaces-api`
+
+## Custom tags
+
+The API adds custom tags to every span extracted from request headers. These
+are in addition to standard span attributes:
+
+| Tag | Source | Description | Example |
+|-----|--------|-------------|---------|
+| `request.id` | `x-request-id` header | Request correlation ID | `a1b2c3d4-e5f6-7890-abcd-ef1234567890` |
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-router.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-router.md
new file mode 100644
index 00000000..b1f876d1
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/tracing/spaces-router.md
@@ -0,0 +1,49 @@
+---
+title: Spaces Router Traces
+sidebar_position: 10
+description: Distributed tracing details for the Spaces Router (Envoy) component.
+---
+
+The Spaces Router uses Envoy as a reverse proxy to route traffic to control
+planes. Envoy generates distributed traces through OpenTelemetry integration,
+providing end-to-end visibility into request flow across the system.
+
+For common tracing configuration, see the
+[distributed tracing overview](overview.md).
+
+## Overview
+
+The router implements distributed tracing using **service.name**:
+`spaces-router`
+
+## Custom tags
+
+The router adds custom tags to every span to enable filtering and grouping by
+control plane. These are in addition to standard HTTP span attributes:
+
+| Tag | Source | Description | Example |
+|-----|--------|-------------|---------|
+| `controlplane.id` | `x-upbound-mxp-id` header | Control plane UUID | `b2b37aaa-ee55-492c-ba0c-4d561a6325fa` |
+| `controlplane.name` | `x-upbound-mxp-host` header | Internal vcluster hostname | `vcluster.mxp-b2b37aaa-ee55-...` |
+| `hostcluster.id` | `x-upbound-hostcluster-id` header | Host cluster identifier (when present) | `a1b2c3d4-e5f6-7890-abcd-...` |
+
+These tags enable queries like:
+
+- "Show me all slow requests to control plane X"
+- "Find errors for control planes in host cluster Y"
+- "Trace a request across multiple control planes"
+
+
+## Envoy-specific attributes
+
+
+The router includes additional Envoy-specific attributes:
+
+| Attribute | Description | Example |
+|-----------|-------------|---------|
+| `upstream_cluster` | Target cluster name | `ctp-b2b37aaa-...-api-cluster` |
+| `response_flags` | Envoy response flags | `-` (none), `UH` (no healthy upstream) |
+| `node_id` | Envoy node identifier | `mxe-router` |
+| `component` | Envoy component | `proxy` |
+| `request_size` | Request body size in bytes | `0`, `1234` |
+| `response_size` | Response body size in bytes | `1827` |
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/troubleshooting.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/troubleshooting.md
new file mode 100644
index 00000000..e39707be
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/troubleshooting.md
@@ -0,0 +1,132 @@
+---
+title: Troubleshooting
+sidebar_position: 100
+description: A guide for troubleshooting an issue that occurs in a Space
+---
+
+Find guidance below on how to find solutions for issues you encounter when deploying and using an Upbound Space. Use the tips below as a supplement to the observability metrics discussed in the [Observability][observability] page.
+
+## General tips
+
+Most issues fall into two general categories:
+
+1. issues with the Spaces management plane
+2. issues on a control plane
+
+If your control plane doesn't reach a `Ready` state, it's indicative of the former. If your control plane is in a created and running state, but resources aren't reconciling, it's indicative of the latter.
+
+### Spaces component layout
+
+Run `kubectl get pods -A` against the cluster hosting a Space. You should see a variety of pods across several namespaces. It should look something like this:
+
+```bash
+NAMESPACE NAME READY STATUS RESTARTS AGE
+cert-manager cert-manager-6d6769565c-mc5df 1/1 Running 0 25m
+cert-manager cert-manager-cainjector-744bb89575-nw4fg 1/1 Running 0 25m
+cert-manager cert-manager-webhook-759d6dcbf7-ps4mq 1/1 Running 0 25m
+ingress-nginx ingress-nginx-controller-7f8ccfccc6-6szlp 1/1 Running 0 25m
+kube-system coredns-5d78c9869d-4p477 1/1 Running 0 26m
+kube-system coredns-5d78c9869d-pdxt6 1/1 Running 0 26m
+kube-system etcd-kind-control-plane 1/1 Running 0 26m
+kube-system kindnet-8s7pq 1/1 Running 0 26m
+kube-system kube-apiserver-kind-control-plane 1/1 Running 0 26m
+kube-system kube-controller-manager-kind-control-plane 1/1 Running 0 26m
+kube-system kube-proxy-l68r8 1/1 Running 0 26m
+kube-system kube-scheduler-kind-control-plane 1/1 Running 0 26m
+local-path-storage local-path-provisioner-6bc4bddd6b-qsdjt 1/1 Running 0 26m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system coredns-5dc69d6447-f56rh-x-kube-system-x-vcluster 1/1 Running 0 21m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system crossplane-6b6d67bc66-6b8nx-x-upbound-system-x-vcluster 1/1 Running 0 20m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system crossplane-rbac-manager-78f6fc7cb4-pjkhc-x-upbound-s-12253c3c4e 1/1 Running 0 20m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system kube-state-metrics-7f8f4dcc5b-8p8c4 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system mxp-gateway-68f546b9c8-xnz5j-x-upbound-system-x-vcluster 1/1 Running 0 20m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system mxp-ksm-config-54655667bb-hv9br 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system mxp-readyz-5f7f97d967-b98bw 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system otlp-collector-56d7d46c8d-g5sh5-x-upbound-system-x-vcluster 1/1 Running 0 20m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system vcluster-67c9fb8959-ppb2m 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system vcluster-api-6bfbccc49d-ffgpj 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system vcluster-controller-7cc6855656-8c46b 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system vcluster-etcd-0 1/1 Running 0 22m
+mxp-706c49fa-5bb8-4a7e-9f41-2fc38ef4b065-system vector-754b494b84-wljw4 1/1 Running 0 22m
+mxp-system mxp-charts-chartmuseum-7587f77558-8tltb 1/1 Running 0 23m
+upbound-system crossplane-b4dc7b4c9-6hjh5 1/1 Running 0 25m
+upbound-system crossplane-contrib-provider-helm-ce18dd03e6e4-7945d8985-4gcwr 1/1 Running 0 24m
+upbound-system crossplane-contrib-provider-kubernetes-1f1e32c1957d-577756gs2x4 1/1 Running 0 24m
+upbound-system crossplane-rbac-manager-d8cb49cbc-gbvvf 1/1 Running 0 25m
+upbound-system spaces-controller-6647677cf9-5zl5q 1/1 Running 0 24m
+upbound-system spaces-router-bc78c96d7-kzts2 2/2 Running 0 24m
+```
+
+What you are seeing is:
+
+- Pods in the `upbound-system` namespace are components required to run the management plane of the Space. This includes the `spaces-controller`, `spaces-router`, and install of UXP.
+- Pods in the `mxp-{GUID}-system` namespace are components that collectively power a control plane. Notable call outs include pod names that look like `vcluster-api-{GUID}` and `vcluster-controller-{GUID}`, which are integral components of a control plane.
+- Pods in other notable namespaces, including `cert-manager` and `ingress-nginx`, are prerequisite components that support a Space's successful operation.
+
+
+
+### Troubleshooting tips for the Spaces management plane
+
+Start by getting the status of all the pods in a Space:
+
+1. Make sure the current context of your kubeconfig points at the Kubernetes cluster hosting your Space
+2. Get the status of all the pods in the Space:
+```bash
+kubectl get pods -A
+```
+3. Scan the `Status` column to see if any of the pods report a status besides `Running`.
+4. Scan the `Restarts` column to see if any of the pods have restarted.
+5. If you notice a Status other than `Running` or see pods that restarted, you should investigate their events by running
+```bash
+kubectl describe pod -n
+```
+
+Next, inspect the status of objects and releases:
+
+1. Make sure the current context of your kubeconfig points at the Kubernetes cluster hosting your Space
+2. Inspect the objects in your Space. If any are unhealthy, describe those objects to get the events:
+```bash
+kubectl get objects
+```
+3. Inspect the releases in your Space. If any are unhealthy, describe those releases to get the events:
+```bash
+kubectl get releases
+```
+
+### Troubleshooting tips for control planes in a Space
+
+General troubleshooting in a control plane starts by fetching the events of the control plane:
+
+1. Make sure the current context of your kubeconfig points at the Kubernetes cluster hosting your Space
+2. Run the following to fetch your control planes.
+```bash
+kubectl get ctp
+```
+3. Describe the control plane by providing its name, found in the preceding instruction.
+```bash
+kubectl describe controlplanes.spaces.upbound.io
+```
+
+## Issues
+
+
+### Your control plane is stuck in a 'creating' state
+
+#### Error: unknown field "ports" in io.k8s.api.networking.v1.NetworkPolicySpec
+
+This error is emitted by a Helm release named `control-plane-host-policies` attempting to be installed by the Spaces software. The full error is:
+
+_CannotCreateExternalResource failed to install release: unable to build kubernetes objects from release manifest: error validating "": error validating data: ValidationError(NetworkPolicy.spec): unknown field "ports" in io.k8s.api.networking.v1.NetworkPolicySpec_
+
+This error may be caused by running a Space on an earlier version of Kubernetes than is supported (`v1.26 or later`). To resolve this issue, upgrade the host Kubernetes cluster version to 1.25 or later.
+
+### Your Spaces install fails
+
+#### Error: You tried to install a Space on a previous Crossplane installation
+
+If you try to install a Space on an existing cluster that previously had Crossplane or UXP on it, you may encounter errors. Due to how the Spaces installer tests for the presence of UXP, it may detect orphaned CRDs that weren't cleaned up by the previous uninstall of Crossplane. You may need to manually [remove old Crossplane CRDs][remove-old-crossplane-crds] for the installer to properly detect the UXP prerequisite.
+
+
+
+
+[observability]: /self-hosted-spaces/howtos/observability
+[remove-old-crossplane-crds]: https://docs.crossplane.io/latest/guides/uninstall-crossplane/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/use-argo.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/use-argo.md
new file mode 100644
index 00000000..e469a144
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/use-argo.md
@@ -0,0 +1,223 @@
+---
+title: Use ArgoCD Plugin
+sidebar_position: 15
+description: A guide for integrating Argo with control planes in a Space.
+aliases:
+ - /all-spaces/self-hosted-spaces/use-argo
+ - /deploy/disconnected-spaces/use-argo-flux
+ - /all-spaces/self-hosted-spaces/use-argo-flux
+ - /connect/use-argo
+---
+
+
+
+:::important
+This feature is in preview and is off by default. To enable, set `features.alpha.argocdPlugin.enabled=true` when installing Spaces:
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ ...
+ --set "features.alpha.argocdPlugin.enabled=true"
+```
+:::
+
+Spaces provides an optional plugin to assist with integrating a control plane in a Space with Argo CD. You must enable the plugin for the entire Space at Spaces install or upgrade time. The plugin's job is to propagate the connection details of each control plane in a Space to Argo CD. By default, Upbound stores these connection details in a Kubernetes secret named after the control plane. To run Argo CD across multiple namespaces, Upbound recommends enabling the `features.alpha.argocdPlugin.useUIDFormatForCTPSecrets` flag to use a UID-based format for secret names to avoid conflicts.
+
+:::tip
+For general guidance on integrating Upbound with GitOps flows, see [GitOps with Control Planes][gitops-with-control-planes].
+:::
+
+## On cluster Argo CD
+
+If you are running Argo CD on the same cluster as the Space, run the following to enable the plugin:
+
+
+
+
+
+
+```bash {hl_lines="3-4"}
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "features.alpha.argocdPlugin.enabled=true" \
+ --set "features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true" \
+ --set "features.alpha.argocdPlugin.target.secretNamespace=argocd"
+```
+
+
+
+
+
+```bash {hl_lines="7-8"}
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ --set "ingress.host=${SPACES_ROUTER_HOST}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "features.alpha.argocdPlugin.enabled=true" \
+ --set "features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true" \
+ --set "features.alpha.argocdPlugin.target.secretNamespace=argocd" \
+ --wait
+```
+
+
+
+
+
+
+The important flags are:
+
+- `features.alpha.argocdPlugin.enabled=true`
+- `features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true`
+- `features.alpha.argocdPlugin.target.secretNamespace=argocd`
+
+The first flag enables the feature and the second indicates the namespace on the cluster where you installed Argo CD.
+
+Be sure to [configure Argo][configure-argo] after it's installed.
+
+## External cluster Argo CD
+
+If you are running Argo CD on an external cluster from where you installed your Space, you need to provide some extra flags:
+
+
+
+
+
+
+```bash {hl_lines="3-7"}
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "features.alpha.argocdPlugin.enabled=true" \
+ --set "features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true" \
+ --set "features.alpha.argocdPlugin.target.secretNamespace=argocd" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.enabled=true" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.name=my-argo-cluster" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.key=kubeconfig"
+```
+
+
+
+
+
+```bash {hl_lines="7-11"}
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ --set "ingress.host=${SPACES_ROUTER_HOST}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "features.alpha.argocdPlugin.enabled=true" \
+ --set "features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true" \
+ --set "features.alpha.argocdPlugin.target.secretNamespace=argocd" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.enabled=true" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.name=my-argo-cluster" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.key=kubeconfig" \
+ --wait
+```
+
+
+
+
+
+```bash
+helm -n upbound-system upgrade --install spaces \
+ oci://xpkg.upbound.io/spaces-artifacts/spaces \
+ --version "${SPACES_VERSION}" \
+ --set "ingress.host=${SPACES_ROUTER_HOST}" \
+ --set "account=${UPBOUND_ACCOUNT}" \
+ --set "features.alpha.argocdPlugin.enabled=true" \
+ --set "features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true" \
+ --set "features.alpha.argocdPlugin.target.secretNamespace=argocd" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.enabled=true" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.name=my-argo-cluster" \
+ --set "features.alpha.argocdPlugin.target.externalCluster.secret.key=kubeconfig" \
+ --wait
+```
+
+The extra flags are:
+
+- `features.alpha.argocdPlugin.target.externalCluster.enabled=true`
+- `features.alpha.argocdPlugin.useUIDFormatForCTPSecrets=true`
+- `features.alpha.argocdPlugin.target.externalCluster.secret.name=my-argo-cluster`
+- `features.alpha.argocdPlugin.target.externalCluster.secret.key=kubeconfig`
+
+These flags tell the plugin (running in Spaces) where your Argo CD instance is. After you've done this at install-time, you also need to create a `Secret` on the Spaces cluster. This secret must contain a kubeconfig pointing to your Argo CD instance. The secret needs to be in the same namespace as the `spaces-controller`, which is `upbound-system`.
+
+Once you enable the plugin and configure it, the plugin automatically propagates connection details for your control planes to your Argo CD instance. You can then target the control plane and use Argo to sync Crossplane-related objects to it.
+
+Be sure to [configure Argo][configure-argo-1] after it's installed.
+
+## Configure Argo
+
+Argo's default configuration causes it to try to query for resource kinds that don't exist in control planes. You should configure Argo's [general configmap][general-configmap] to include the resource group/kinds which make sense in the context of control planes. For example, the concept of `nodes` isn't exposed in control planes.
+
+To configure Argo CD, connect to the cluster where you've installed it and edit the configmap:
+
+```bash
+kubectl edit configmap argocd-cm -n argocd
+```
+
+Adjust the resource inclusions and exclusions under the `data` field of the configmap:
+
+```yaml
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: argocd-cm
+ namespace: argocd
+data:
+ resource.exclusions: |
+ - apiGroups:
+ - "*"
+ kinds:
+ - "*"
+ clusters:
+ - "*"
+ resource.inclusions: |
+ - apiGroups:
+ - "*"
+ kinds:
+ - Provider
+ - Configuration
+ clusters:
+ - "*"
+```
+
+The preceding configuration causes Argo to exclude syncing **all** resource group/kinds--except Crossplane `providers` and `configurations`--for **all** control planes. You're encouraged to adjust the `resource.inclusions` to include the types that make sense for your control plane, such as an `XRD` you've built with Crossplane. You're also encouraged to customize the `clusters` pattern to selectively apply these exclusions/inclusions to control planes (for example, `control-plane-prod-*`).
+
+## Control plane connection secrets
+
+To deploy control planes through Argo CD, you need to configure the `writeConnectionSecretToRef` field in your control plane spec. This field specifies where to store the control plane's `kubeconfig` and makes connection details available to Argo CD.
+
+### Basic Configuration
+
+In your control plane manifest, include the `writeConnectionSecretToRef` field:
+
+```yaml
+apiVersion: spaces.upbound.io/v1beta1
+kind: ControlPlane
+metadata:
+ name: my-control-plane
+ namespace: my-control-plane-group
+spec:
+ writeConnectionSecretToRef:
+ name: kubeconfig-my-control-plane
+ namespace: my-control-plane-group
+ # ... other control plane configuration
+```
+
+### Parameters
+
+The `writeConnectionSecretToRef` field requires two parameters:
+
+- `name`: A unique name for the secret containing the kubeconfig (`kubeconfig-my-control-plane`)
+- `namespace`: The Kubernetes namespace where you store the secret, which must match the metadata namespace. The system copies it into the `argocd` namespace when you set the `features.alpha.argocdPlugin.target.secretNamespace=argocd` configuration parameter.
+
+Control plane labels automatically propagate to the connection secret, which allows you to use label selectors in Argo CD for automated discovery and management.
+
+This configuration enables Argo CD to automatically discover and manage resources on your control planes.
+
+
+[gitops-with-control-planes]: /cloud-spaces/howtos/gitops-on-upbound
+[configure-argo]: #configure-argo
+[configure-argo-1]: #configure-argo
+[general-configmap]: https://argo-cd.readthedocs.io/en/stable/operator-manual/argocd-cm-yaml/
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/_category_.json b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/_category_.json
new file mode 100644
index 00000000..c5ecc93f
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/_category_.json
@@ -0,0 +1,11 @@
+{
+ "label": "Workload Identity Configuration",
+ "position": 2,
+ "collapsed": true,
+ "customProps": {
+ "plan": "business"
+ }
+
+}
+
+
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/backup-restore-config.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/backup-restore-config.md
new file mode 100644
index 00000000..77617116
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/backup-restore-config.md
@@ -0,0 +1,384 @@
+---
+title: Backup and Restore Workload ID
+weight: 1
+description: Configure workload identity for Spaces Backup and Restore
+---
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant temporary
+AWS credentials to your Kubernetes pod with a service account. Assigning IAM roles and service accounts allows the pod to assume the IAM role dynamically and much more securely than static credentials.
+
+This guide walks you through creating an IAM trust role policy and applying it
+to your EKS cluster to handle backup and restore storage.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary Azure credentials to your Kubernetes pod based on
+a service account. Assigning managed identities and service accounts allows the pod to
+authenticate with Azure resources dynamically and much more securely than static credentials.
+
+This guide walks you through creating a managed identity and federated credential for your AKS
+cluster to handle backup and restore storage.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary GCP credentials to your Kubernetes pod based on
+a service account. Assigning IAM roles and service accounts allows the pod to
+access cloud resources dynamically and much more securely than static credentials.
+
+This guide walks you through configuring workload identity for your GKE
+cluster to handle backup and restore storage.
+
+
+
+## Prerequisites
+
+
+To set up a workload-identity, you'll need:
+
+
+- A self-hosted Space cluster
+- Administrator access in your cloud provider
+- Helm and `kubectl`
+
+## About the backup and restore component
+
+The `mxp-controller` component handles backup and restore workloads. It needs to
+access your cloud storage to store and retrieve backups. By default, this
+component runs in each control plane's host namespace.
+
+## Configuration
+
+
+
+Upbound supports workload-identity configurations in AWS with IAM Roles for
+Service Accounts and EKS pod identity association.
+
+#### IAM Roles for Service Accounts (IRSA)
+
+With IRSA, you can associate a Kubernetes service account in an EKS cluster with
+an AWS IAM role. Upbound authenticates workloads with that service account as
+the IAM role using temporary credentials instead of static role credentials.
+IRSA relies on AWS `AssumeRoleWithWebIdentity` `STS` to exchange OIDC ID tokens with
+the IAM role's temporary credentials. IRSA uses the `eks.amazon.aws/role-arn`
+annotation to link the service account and the IAM role.
+
+First, create an IAM role with appropriate permissions to access your S3 bucket:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "s3:GetObject",
+ "s3:PutObject",
+ "s3:ListBucket",
+ "s3:DeleteObject"
+ ],
+ "Resource": [
+ "arn:aws:s3:::${YOUR_BACKUP_BUCKET}",
+ "arn:aws:s3:::${YOUR_BACKUP_BUCKET}/*"
+ ]
+ }
+ ]
+}
+```
+
+Next, ensure your EKS cluster has an OIDC identity provider:
+
+```shell
+eksctl utils associate-iam-oidc-provider --cluster ${YOUR_CLUSTER_NAME} --approve
+```
+
+Configure the IAM role trust policy with the namespace for each
+provisioned control plane.
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Principal": {
+ "Federated": "arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:oidc-provider/${YOUR_OIDC_PROVIDER}"
+ },
+ "Action": "sts:AssumeRoleWithWebIdentity",
+ "Condition": {
+ "StringEquals": {
+ "${YOUR_OIDC_PROVIDER}:aud": "sts.amazonaws.com",
+ "${YOUR_OIDC_PROVIDER}:sub": "system:serviceaccount:${YOUR_NAMESPACE}:mxp-controller"
+ }
+ }
+ }
+ ]
+}
+```
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the Backup and Restore component:
+
+```shell
+--set controlPlanes.mxpController.serviceAccount.annotations."eks\.amazonaws\.com/role-arn"="${SPACES_BR_IAM_ROLE_ARN}"
+```
+
+This command allows the backup and restore component to authenticate with your
+dedicated IAM role in your EKS cluster environment.
+
+#### EKS pod identities
+
+Upbound also supports EKS Pod Identity configuration. EKS Pod Identities allow
+you to create a pod identity association with your Kubernetes namespace, a
+service account, and an IAM role, which allows the EKS control plane to
+automatically handle the credential exchange.
+
+First, create an IAM role with appropriate permissions to access your S3 bucket:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "s3:GetObject",
+ "s3:PutObject",
+ "s3:ListBucket",
+ "s3:DeleteObject"
+ ],
+ "Resource": [
+ "arn:aws:s3:::${YOUR_BACKUP_BUCKET}",
+ "arn:aws:s3:::${YOUR_BACKUP_BUCKET}/*"
+ ]
+ }
+ ]
+}
+```
+
+When you install or upgrade your Space with Helm, add the backup/restore values:
+
+```shell
+helm upgrade spaces spaces-helm-chart \
+ --set "billing.enabled=true" \
+ --set "backup.enabled=true" \
+ --set "backup.storage.provider=aws" \
+ --set "backup.storage.aws.region= ${YOUR_AWS_REGION}" \
+ --set "backup.storage.aws.bucket= ${YOUR_BACKUP_BUCKET}"
+```
+
+After Upbound provisions your control plane, create a Pod Identity Association
+with the `aws` CLI:
+
+```shell
+aws eks create-pod-identity-association \
+ --cluster-name ${YOUR_CLUSTER_NAME} \
+ --namespace ${YOUR_CONTROL_PLANE_NAMESPACE} \
+ --service-account mxp-controller \
+ --role-arn arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:role/backup-restore-role
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in Azure with Azure's built-in
+workload identity feature.
+
+#### Prepare your cluster
+
+First, enable the OIDC issuer and workload identity in your AKS cluster:
+
+```shell
+az aks update --resource-group ${YOUR_RESOURCE_GROUP} --name ${YOUR_AKS_CLUSTER_NAME} --enable-oidc-issuer --enable-workload-identity
+```
+
+Next, find and store the OIDC issuer URL as an environment variable:
+
+```shell
+export AKS_OIDC_ISSUER="$(az aks show --name ${YOUR_AKS_CLUSTER_NAME} --resource-group ${YOUR_RESOURCE_GROUP} --query "oidcIssuerProfile.issuerUrl" --output tsv)"
+```
+
+#### Create a User-Assigned Managed Identity
+
+Create a new managed identity to associate with the backup and restore component:
+
+```shell
+az identity create --name backup-restore-identity --resource-group ${YOUR_RESOURCE_GROUP} --location ${YOUR_LOCATION}
+```
+
+Retrieve the client ID and store it as an environment variable:
+
+```shell
+export USER_ASSIGNED_CLIENT_ID="$(az identity show --name backup-restore-identity --resource-group ${YOUR_RESOURCE_GROUP} --query clientId -otsv)"
+```
+
+Grant the managed identity you created to access your Azure Storage account:
+
+```shell
+az role assignment create \
+ --role "Storage Blob Data Contributor" \
+ --assignee ${USER_ASSIGNED_CLIENT_ID} \
+ --scope /subscriptions/${YOUR_SUBSCRIPTION_ID}/resourceGroups/${YOUR_RESOURCE_GROUP}/providers/Microsoft.Storage/storageAccounts/${YOUR_STORAGE_ACCOUNT}
+```
+
+#### Apply the managed identity role
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the backup and restore component:
+
+```shell
+--set controlPlanes.mxpController.serviceAccount.annotations."azure\.workload\.identity/client-id"="${YOUR_USER_ASSIGNED_CLIENT_ID}"
+--set controlPlanes.mxpController.pod.customLabels."azure\.workload\.identity/use"="true"
+```
+
+#### Create a Federated Identity credential
+
+```shell
+az identity federated-credential create \
+ --name backup-restore-federated-identity \
+ --identity-name backup-restore-identity \
+ --resource-group ${YOUR_RESOURCE_GROUP} \
+ --issuer ${AKS_OIDC_ISSUER} \
+ --subject system:serviceaccount:${YOUR_CONTROL_PLANE_NAMESPACE}:mxp-controller
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in GCP with IAM principal
+identifiers and service account impersonation.
+
+#### Prepare your cluster
+
+First, enable Workload Identity Federation on your GKE cluster:
+
+```shell
+gcloud container clusters update ${YOUR_CLUSTER_NAME} \
+ --workload-pool=${YOUR_PROJECT_ID}.svc.id.goog \
+ --region=${YOUR_REGION}
+```
+
+#### Create a Google Service Account
+
+Create a service account for the backup and restore component:
+
+```shell
+gcloud iam service-accounts create backup-restore-sa \
+ --display-name "Backup Restore Service Account" \
+ --project ${YOUR_PROJECT_ID}
+```
+
+Grant the service account access to your Google Cloud Storage bucket:
+
+```shell
+gcloud projects add-iam-policy-binding ${YOUR_PROJECT_ID} \
+ --member "serviceAccount:backup-restore-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com" \
+ --role "roles/storage.objectAdmin"
+```
+
+#### Configure Workload Identity
+
+Create an IAM binding to grant the Kubernetes service account access to the Google service account:
+
+```shell
+gcloud iam service-accounts add-iam-policy-binding \
+ backup-restore-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com \
+ --role roles/iam.workloadIdentityUser \
+ --member "serviceAccount:${YOUR_PROJECT_ID}.svc.id.goog[${YOUR_CONTROL_PLANE_NAMESPACE}/mxp-controller]"
+```
+
+#### Apply the service account configuration
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the backup and restore component:
+
+```shell
+--set controlPlanes.mxpController.serviceAccount.annotations."iam\.gke\.io/gcp-service-account"="backup-restore-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com"
+```
+
+
+
+## Verify your configuration
+
+After you apply the configuration use `kubectl` to verify the service account
+has the correct annotation:
+
+```shell
+kubectl get serviceaccount mxp-controller -n ${YOUR_CONTROL_PLANE_NAMESPACE} -o yaml
+```
+
+Verify the `mxp-controller` pod is running:
+
+```shell
+kubectl get pods -n ${YOUR_CONTROL_PLANE_NAMESPACE} | grep mxp-controller
+```
+
+## Restart workload
+
+You must manually restart a workload's pod when you add the workload identity annotations to the running pod's service account.
+
+
+
+This restart enables the EKS pod identity webhook to inject the necessary
+environment for using IRSA.
+
+
+
+
+
+This restart enables the workload identity webhook to inject the necessary
+environment for using Azure workload identity.
+
+
+
+
+
+This restart enables the workload identity webhook to inject the necessary
+environment for using GCP workload identity.
+
+
+
+```shell
+kubectl rollout restart deployment mxp-controller -n ${YOUR_CONTROL_PLANE_NAMESPACE}
+```
+
+## Use cases
+
+
+Configuring backup and restore with workload identity eliminates the need for
+static credentials in your cluster and the overhead of credential rotation.
+These benefits are helpful in:
+
+* Disaster recovery scenarios
+* Control plane migration
+* Compliance requirements
+* Rollbacks after unsuccessful upgrades
+
+## Next steps
+
+Now that you have a workload identity configured for the backup and restore
+component, visit the [Backup Configuration][backup-restore-guide] documentation.
+
+Other workload identity guides are:
+* [Billing][billing]
+* [Shared Secrets][secrets]
+
+[backup-restore-guide]: /self-hosted-spaces/howtos/backup-and-restore
+[billing]: /self-hosted-spaces/howtos/workload-id/billing-config
+[secrets]: /self-hosted-spaces/howtos/workload-id/eso-config
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/billing-config.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/billing-config.md
new file mode 100644
index 00000000..737f446a
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/billing-config.md
@@ -0,0 +1,454 @@
+---
+title: Billing Workload ID
+weight: 1
+description: Configure workload identity for Spaces Billing
+---
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary AWS credentials to your Kubernetes pod based on
+a service account. Assigning IAM roles and service accounts allows the pod to
+assume the IAM role dynamically and much more securely than static credentials.
+
+This guide walks you through creating an IAM trust role policy and applying it to your EKS
+cluster for billing in your Space cluster.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary Azure credentials to your Kubernetes pod based on
+a service account. Assigning managed identities and service accounts allows the pod to
+authenticate with Azure resources dynamically and much more securely than static credentials.
+
+This guide walks you through creating a managed identity and federated credential for your AKS
+cluster for billing in your Space cluster.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary GCP credentials to your Kubernetes pod based on
+a service account. Assigning IAM roles and service accounts allows the pod to
+access cloud resources dynamically and much more securely than static
+credentials.
+
+This guide walks you through configuring workload identity for your GKE
+cluster's billing component.
+
+
+
+## Prerequisites
+
+
+To set up a workload-identity, you'll need:
+
+
+- A self-hosted Space cluster
+- Administrator access in your cloud provider
+- Helm and `kubectl`
+
+## About the billing component
+
+The `vector.dev` component handles billing metrics collection in spaces. It
+stores account data in your cloud storage. By default, this component runs in
+each control plane's host namespace.
+
+## Configuration
+
+
+
+Upbound supports workload-identity configurations in AWS with IAM Roles for
+Service Accounts and EKS pod identity association.
+
+#### IAM Roles for Service Accounts (IRSA)
+
+With IRSA, you can associate a Kubernetes service account in an EKS cluster with
+an AWS IAM role. Upbound authenticates workloads with that service account as
+the IAM role using temporary credentials instead of static role credentials.
+IRSA relies on AWS `AssumeRoleWithWebIdentity` `STS` to exchange OIDC ID tokens with
+the IAM role's temporary credentials. IRSA uses the `eks.amazon.aws/role-arn`
+annotation to link the service account and the IAM role.
+
+**Create an IAM role and trust policy**
+
+First, create an IAM role appropriate permissions to access your S3 bucket:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "s3:GetObject",
+ "s3:PutObject",
+ "s3:ListBucket",
+ "s3:DeleteObject"
+ ],
+ "Resource": [
+ "arn:aws:s3:::${YOUR_BILLING_BUCKET}",
+ "arn:aws:s3:::${YOUR_BILLING_BUCKET}/*"
+ ]
+ }
+ ]
+}
+```
+
+You must configure the IAM role trust policy with the exact match for each
+provisioned control plane. An example of a trust policy for a single control
+plane is below:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Principal": {
+ "Federated": "arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:oidc-provider/${YOUR_OIDC_PROVIDER}"
+ },
+ "Action": "sts:AssumeRoleWithWebIdentity",
+ "Condition": {
+ "StringEquals": {
+ ":aud": "sts.amazonaws.com",
+ ":sub": "system:serviceaccount:${YOUR_NAMESPACE}:vector"
+ }
+ }
+ }
+ ]
+}
+```
+
+**Configure the EKS OIDC provider**
+
+Next, ensure your EKS cluster has an OIDC identity provider:
+
+```shell
+eksctl utils associate-iam-oidc-provider --cluster ${YOUR_CLUSTER_NAME} --approve
+```
+
+**Apply the IAM role**
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the Billing component:
+
+```shell
+--set "billing.enabled=true"
+--set "billing.storage.provider=aws"
+--set "billing.storage.aws.region=${YOUR_AWS_REGION}"
+--set "billing.storage.aws.bucket=${YOUR_BILLING_BUCKET}"
+--set "billing.storage.secretRef.name="
+--set controlPlanes.vector.serviceAccount.customAnnotations."eks\.amazonaws\.com/role-arn"="arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:role/${YOUR_BILLING_ROLE_NAME}"
+```
+
+:::important
+You **must** set the `billing.storage.secretRef.name` to an empty string to
+enable workload identity for the billing component
+:::
+
+#### EKS pod identities
+
+Upbound also supports EKS Pod Identity configuration. EKS Pod Identities allow
+you to create a pod identity association with your Kubernetes namespace, a
+service account, and an IAM role, which allows the EKS control plane to
+automatically handle the credential exchange.
+
+**Create an IAM role**
+
+First, create an IAM role appropriate permissions to access your S3 bucket:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "s3:GetObject",
+ "s3:PutObject",
+ "s3:ListBucket"
+ ],
+ "Resource": [
+ "arn:aws:s3:::${YOUR_BILLING_BUCKET}",
+ "arn:aws:s3:::${YOUR_BILLING_BUCKET}/*"
+ ]
+ }
+ ]
+}
+```
+
+**Configure your Space with Helm**
+
+When you install or upgrade your Space with Helm, add the billing values:
+
+```shell
+helm upgrade spaces spaces-helm-chart \
+ --set "billing.enabled=true" \
+ --set "billing.storage.provider=aws" \
+ --set "billing.storage.aws.region=${YOUR_AWS_REGION}" \
+ --set "billing.storage.aws.bucket=${YOUR_BILLING_BUCKET}" \
+ --set "billing.storage.secretRef.name="
+```
+
+**Create a Pod Identity Association**
+
+After Upbound provisions your control plane, create a Pod Identity Association
+with the `aws` CLI:
+
+```shell
+aws eks create-pod-identity-association \
+ --cluster-name ${YOUR_CLUSTER_NAME} \
+ --namespace ${YOUR_CONTROL_PLANE_NAMESPACE} \
+ --service-account vector \
+ --role-arn arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:role/${YOUR_BILLING_ROLE_NAME}
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in Azure with Azure's built-in
+workload identity feature.
+
+First, enable the OIDC issuer and workload identity in your AKS cluster:
+
+```shell
+az aks update --resource-group ${YOUR_RESOURCE_GROUP} --name ${YOUR_AKS_CLUSTER_NAME} --enable-oidc-issuer --enable-workload-identity
+```
+
+Next, find and store the OIDC issuer URL as an environment variable:
+
+```shell
+export AKS_OIDC_ISSUER="$(az aks show --name ${YOUR_AKS_CLUSTER_NAME} --resource-group ${YOUR_RESOURCE_GROUP} --query "oidcIssuerProfile.issuerUrl" --output tsv)"
+```
+
+Create a new managed identity to associate with the billing component:
+
+```shell
+az identity create --name billing-identity --resource-group ${YOUR_RESOURCE_GROUP} --location ${YOUR_LOCATION}
+```
+
+Retrieve the client ID and store it as an environment variable:
+
+```shell
+export USER_ASSIGNED_CLIENT_ID="$(az identity show --name billing-identity --resource-group ${YOUR_RESOURCE_GROUP} --query clientId -otsv)"
+```
+
+Grant the managed identity you created to access your Azure Storage account:
+
+```shell
+az role assignment create --role "Storage Blob Data Contributor" --assignee $USER_ASSIGNED_CLIENT_ID --scope /subscriptions/${YOUR_SUBSCRIPTION_ID}/resourceGroups/${YOUR_RESOURCE_GROUP}/providers/Microsoft.Storage/storageAccounts/${YOUR_STORAGE_ACCOUNT}
+```
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the billing component:
+
+```shell
+--set "billing.enabled=true"
+--set "billing.storage.provider=azure"
+--set "billing.storage.azure.storageAccount=${SPACES_BILLING_STORAGE_ACCOUNT}"
+--set "billing.storage.azure.container=${SPACES_BILLING_STORAGE_CONTAINER}"
+--set "billing.storage.secretRef.name="
+--set controlPlanes.vector.serviceAccount.customAnnotations."azure\.workload\.identity/client-id"="${SPACES_BILLING_APP_ID}"
+--set controlPlanes.vector.pod.customLabels."azure\.workload\.identity/use"="true"
+```
+
+Create a federated credential to establish trust between the managed identity
+and your AKS OIDC provider:
+
+```shell
+az identity federated-credential create \
+ --name billing-federated-identity \
+ --identity-name billing-identity \
+ --resource-group ${YOUR_RESOURCE_GROUP} \
+ --issuer ${AKS_OIDC_ISSUER} \
+ --subject system:serviceaccount:${YOUR_CONTROL_PLANE_NAMESPACE}:vector
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in GCP with IAM principal
+identifiers or service account impersonation.
+
+#### IAM principal identifiers
+
+IAM principal identifiers allow you to grant permissions directly to
+Kubernetes service accounts without additional annotation. Upbound recommends
+this approach for ease-of-use and flexibility.
+
+First, enable Workload Identity Federation on your GKE cluster:
+
+```shell
+gcloud container clusters update ${YOUR_CLUSTER_NAME} \
+ --workload-pool=${YOUR_PROJECT_ID}.svc.id.goog \
+ --region=${YOUR_REGION}
+```
+
+Next, configure your Spaces installation with the Spaces Helm chart parameters:
+
+```shell
+--set "billing.enabled=true"
+--set "billing.storage.provider=gcp"
+--set "billing.storage.gcp.bucket=${YOUR_BILLING_BUCKET}"
+--set "billing.storage.secretRef.name="
+```
+
+:::important
+You **must** set the `billing.storage.secretRef.name` to an empty string to
+enable workload identity for the billing component.
+:::
+
+Grant the necessary permissions to your Kubernetes service account:
+
+```shell
+gcloud projects add-iam-policy-binding ${YOUR_PROJECT_ID} \
+ --member="principalSet://iam.googleapis.com/projects/${YOUR_PROJECT_NUMBER}/locations/global/workloadIdentityPools/${YOUR_PROJECT_ID}.svc.id.goog/attribute.kubernetes_namespace/${YOUR_CONTROL_PLANE_NAMESPACE}/attribute.kubernetes_service_account/vector" \
+ --role="roles/storage.objectAdmin"
+```
+
+Enable uniform bucket-level access on your storage bucket:
+
+```shell
+gcloud storage buckets update gs://${YOUR_BILLING_BUCKET} --uniform-bucket-level-access
+```
+
+#### Service account impersonation
+
+Service account impersonation allows you to link a Kubernetes service account to
+a GCP service account. The Kubernetes service account assumes the permissions of
+the GCP service account you specify.
+
+Enable workload id federation on your GKE cluster:
+
+```shell
+gcloud container clusters update ${YOUR_CLUSTER_NAME} \
+ --workload-pool=${YOUR_PROJECT_ID}.svc.id.goog \
+ --region=${YOUR_REGION}
+```
+
+Next, create a dedicated service account for your billing operations:
+
+```shell
+gcloud iam service-accounts create billing-sa \
+ --project=${YOUR_PROJECT_ID}
+```
+
+Grant storage permissions to the service account you created:
+
+```shell
+gcloud projects add-iam-policy-binding ${YOUR_PROJECT_ID} \
+ --member="serviceAccount:billing-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com" \
+ --role="roles/storage.objectAdmin"
+```
+
+Link the Kubernetes service account to the GCP service account:
+
+```shell
+gcloud iam service-accounts add-iam-policy-binding \
+ billing-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com \
+ --role="roles/iam.workloadIdentityUser" \
+ --member="serviceAccount:${YOUR_PROJECT_ID}.svc.id.goog[${YOUR_CONTROL_PLANE_NAMESPACE}/vector]"
+```
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the billing component:
+
+```shell
+--set "billing.enabled=true"
+--set "billing.storage.provider=gcp"
+--set "billing.storage.gcp.bucket=${YOUR_BILLING_BUCKET}"
+--set "billing.storage.secretRef.name="
+--set controlPlanes.vector.serviceAccount.customAnnotations."iam\.gke\.io/gcp-service-account"="billing-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com"
+```
+
+
+
+## Verify your configuration
+
+After you apply the configuration use `kubectl` to verify the service account
+has the correct annotation:
+
+```shell
+kubectl get serviceaccount vector -n ${YOUR_CONTROL_PLANE_NAMESPACE} -o yaml
+```
+
+Verify the `vector` pod is running:
+
+```shell
+kubectl get pods -n ${YOUR_CONTROL_PLANE_NAMESPACE} | grep vector
+```
+
+## Restart workload
+
+
+
+You must manually restart a workload's pod when you add the
+`eks.amazonaws.com/role-arn key` annotation to the running pod's service
+account.
+
+This restart enables the EKS pod identity webhook to inject the necessary
+environment for using IRSA.
+
+
+
+
+
+You must manually restart a workload's pod when you add the workload identity annotations to the running pod's service account.
+
+This restart enables the workload identity webhook to inject the necessary
+environment for using Azure workload identity.
+
+
+
+
+
+GCP workload identity doesn't require pod restarts after configuration changes.
+If you do need to restart the workload, use the `kubectl` command to force the
+component restart:
+
+
+
+```shell
+kubectl rollout restart deployment vector
+```
+
+
+## Use cases
+
+
+Using workload identity authentication for billing eliminates the need for static
+credentials in your cluster as well as the overhead of credential rotation.
+These benefits are helpful in:
+
+* Resource usage tracking across teams/projects
+* Cost allocation for multi-tenant environments
+* Financial auditing requirements
+* Capacity billing and resource optimization
+* Automated billing workflows
+
+## Next steps
+
+Now that you have workload identity configured for the billing component, visit
+the [Billing guide][billing-guide] for more information.
+
+Other workload identity guides are:
+* [Backup and restore][backuprestore]
+* [Shared Secrets][secrets]
+
+[billing-guide]: /self-hosted-spaces/howtos/billing
+[backuprestore]: /self-hosted-spaces/howtos/workload-id/backup-restore-config
+[secrets]: /self-hosted-spaces/howtos/workload-id/eso-config
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/eso-config.md b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/eso-config.md
new file mode 100644
index 00000000..90ac6ba6
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/howtos/workload-id/eso-config.md
@@ -0,0 +1,503 @@
+---
+title: Shared Secrets Workload ID
+weight: 1
+description: Configure workload identity for Spaces Shared Secrets
+---
+import GlobalLanguageSelector, { CodeBlock } from '@site/src/components/GlobalLanguageSelector';
+
+
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary AWS credentials to your Kubernetes pod based on
+a service account. Assigning IAM roles and service accounts allows the pod to
+assume the IAM role dynamically and much more securely than static credentials.
+
+This guide walks you through creating an IAM trust role policy and applying it to your EKS
+cluster for secret sharing with Kubernetes.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary Azure credentials to your Kubernetes pod based on
+a service account. Assigning managed identities and service accounts allows the pod to
+authenticate with Azure resources dynamically and much more securely than static credentials.
+
+This guide walks you through creating a managed identity and federated credential for your AKS
+cluster for shared secrets in your Space cluster.
+
+
+
+
+
+Workload-identity authentication lets you use access policies to grant your
+self-hosted Space cluster access to your cloud providers. Workload identity
+authentication grants temporary GCP credentials to your Kubernetes pod based on
+a service account. Assigning IAM roles and service accounts allows the pod to
+access cloud resources dynamically and much more securely than static
+credentials.
+
+This guide walks you through configuring workload identity for your GKE
+cluster's Shared Secrets component.
+
+
+
+## Prerequisites
+
+
+To set up a workload-identity, you'll need:
+
+
+- A self-hosted Space cluster
+- Administrator access in your cloud provider
+- Helm and `kubectl`
+
+
+## About the Shared Secrets component
+
+
+
+
+The External Secrets Operator (ESO) runs in each control plane's host namespace as `external-secrets-controller`. It needs to access
+your external secrets management service like AWS Secrets Manager.
+
+To configure your shared secrets workflow controller, you must:
+
+* Annotate the Kubernetes service account to associate it with a cloud-side
+ principal (such as an IAM role, service account, or enterprise application). The workload must then
+ use this service account.
+* Label the workload (pod) to allow the injection of a temporary credential set,
+ enabling authentication.
+
+
+
+
+
+The External Secrets Operator (ESO) component runs in each control plane's host
+namespace as `external-secrets-controller`. It synchronizes secrets from
+external APIs into Kubernetes secrets. Shared secrets allow you to manage
+credentials outside your Kubernetes cluster while making them available to your
+application
+
+
+
+
+
+The External Secrets Operator (ESO) component runs in each control plane's host
+namespace as `external-secrets-controller`. It synchronizes secrets from
+external APIs into Kubernetes secrets. Shared secrets allow you to manage
+credentials outside your Kubernetes cluster while making them available to your
+application
+
+
+
+## Configuration
+
+
+
+Upbound supports workload-identity configurations in AWS with IAM Roles for
+Service Accounts or EKS pod identity association.
+
+#### IAM Roles for Service Accounts (IRSA)
+
+With IRSA, you can associate a Kubernetes service account in an EKS cluster with
+an AWS IAM role. Upbound authenticates workloads with that service account as
+the IAM role using temporary credentials instead of static role credentials.
+IRSA relies on AWS `AssumeRoleWithWebIdentity` `STS` to exchange OIDC ID tokens with
+the IAM role's temporary credentials. IRSA uses the `eks.amazon.aws/role-arn`
+annotation to link the service account and the IAM role.
+
+**Create an IAM role and trust policy**
+
+First, create an IAM role with appropriate permissions to access AWS Secrets Manager:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "secretsmanager:GetSecretValue",
+ "secretsmanager:DescribeSecret",
+ "ssm:GetParameter"
+ ],
+ "Resource": [
+ "arn:aws:secretsmanager:${YOUR_REGION}:${YOUR_AWS_ACCOUNT_ID}:secret:${YOUR_SECRET_PREFIX}*",
+ "arn:aws:ssm:${YOUR_REGION}:${YOUR_AWS_ACCOUNT_ID}:parameter/${YOUR_PARAMETER_PREFIX}*"
+ ]
+ }
+ ]
+}
+```
+
+You must configure the IAM role trust policy with the exact match for each
+provisioned control plane. An example of a trust policy for a single control
+plane is below:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Principal": {
+ "Federated": "arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:oidc-provider/${YOUR_OIDC_PROVIDER}"
+ },
+ "Action": "sts:AssumeRoleWithWebIdentity",
+ "Condition": {
+ "StringEquals": {
+ ":aud": "sts.amazonaws.com"
+ },
+ "StringLike": {
+ ":sub": "system:serviceaccount:*:external-secrets-controller"
+ }
+ }
+ }
+ ]
+}
+```
+
+**Configure the EKS OIDC provider**
+
+Next, ensure your EKS cluster has an OIDC identity provider:
+
+```shell
+eksctl utils associate-iam-oidc-provider --cluster ${YOUR_CLUSTER_NAME} --approve
+```
+
+**Apply the IAM role**
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the shared secrets component:
+
+```yaml
+--set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."eks\.amazonaws\.com/role-arn"="arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:role/${YOUR_ESO_ROLE_NAME}"
+```
+
+This command allows the shared secrets component to authenticate with your
+dedicated IAM role in your EKS cluster environment.
+
+#### EKS pod identities
+
+Upbound also supports EKS Pod Identity configuration. EKS Pod Identities allow
+you to create a pod identity association with your Kubernetes namespace, a
+service account, and an IAM role, which allows the EKS control plane to
+automatically handle the credential exchange.
+
+**Create an IAM role**
+
+First, create an IAM role with appropriate permissions to access AWS Secrets Manager:
+
+```json
+{
+ "Version": "2012-10-17",
+ "Statement": [
+ {
+ "Effect": "Allow",
+ "Action": [
+ "secretsmanager:GetSecretValue",
+ "secretsmanager:DescribeSecret",
+ "ssm:GetParameter"
+ ],
+ "Resource": [
+ "arn:aws:secretsmanager:${YOUR_AWS_REGION}:${YOUR_AWS_ACCOUNT_ID}:secret:${YOUR_SECRET_PREFIX}*",
+ "arn:aws:ssm:${YOUR_AWS_REGION}:${YOUR_AWS_ACCOUNT_ID}:parameter/${YOUR_PARAMETER_PREFIX}*"
+ ]
+ }
+ ]
+}
+```
+
+**Configure your Space with Helm**
+
+When you install or upgrade your Space with Helm, add the shared secrets value:
+
+```shell
+helm upgrade spaces spaces-helm-chart \
+ --set "sharedSecrets.enabled=true"
+```
+
+**Create a Pod Identity Association**
+
+After Upbound provisions your control plane, create a Pod Identity Association
+with the `aws` CLI:
+
+```shell
+aws eks create-pod-identity-association \
+ --cluster-name ${YOUR_CLUSTER_NAME} \
+ --namespace ${YOUR_CONTROL_PLANE_NAMESPACE} \
+ --service-account external-secrets-controller \
+ --role-arn arn:aws:iam::${YOUR_AWS_ACCOUNT_ID}:role/${YOUR_ROLE_NAME}
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in Azure with Azure's built-in
+workload identity feature.
+
+First, enable the OIDC issuer and workload identity in your AKS cluster:
+
+```shell
+az aks update --resource-group ${YOUR_RESOURCE_GROUP} --name ${YOUR_AKS_CLUSTER_NAME} --enable-oidc-issuer --enable-workload-identity
+```
+
+Next, find and store the OIDC issuer URL as an environment variable:
+
+```shell
+export AKS_OIDC_ISSUER="$(az aks show --name ${YOUR_AKS_CLUSTER_NAME} --resource-group ${YOUR_RESOURCE_GROUP} --query "oidcIssuerProfile.issuerUrl" --output tsv)"
+```
+
+Create a new managed identity to associate with the shared secrets component:
+
+```shell
+az identity create --name secrets-identity --resource-group ${YOUR_RESOURCE_GROUP} --location ${YOUR_LOCATION}
+```
+
+Retrieve the client ID and store it as an environment variable:
+
+```shell
+export USER_ASSIGNED_CLIENT_ID="$(az identity show --name secrets-identity --resource-group ${YOUR_RESOURCE_GROUP} --query clientId -otsv)"
+```
+
+Grant the managed identity you created to access your Azure Storage account:
+
+```shell
+az keyvault set-policy --name ${YOUR_KEY_VAULT_NAME} \
+ --resource-group ${YOUR_RESOURCE_GROUP} \
+ --object-id $(az identity show --name secrets-identity --resource-group ${YOUR_RESOURCE_GROUP} --query principalId -otsv) \
+ --secret-permissions get list
+```
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the shared secrets component:
+
+```shell
+--set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."azure\.workload\.identity/client-id"="${USER_ASSIGNED_CLIENT_ID}"
+--set controlPlanes.sharedSecrets.pod.customLabels."azure\.workload\.identity/use"="true"
+```
+
+Next, create a federated credential to establish trust between the managed identity
+and your AKS OIDC provider:
+
+```shell
+az identity federated-credential create \
+ --name secrets-federated-identity \
+ --identity-name secrets-identity \
+ --resource-group ${YOUR_RESOURCE_GROUP} \
+ --issuer ${AKS_OIDC_ISSUER} \
+ --subject system:serviceaccount:${YOUR_CONTROL_PLANE_NAMESPACE}:external-secrets-controller
+```
+
+
+
+
+
+Upbound supports workload-identity configurations in GCP with IAM principal
+identifiers or service account impersonation.
+
+#### IAM principal identifiers
+
+IAM principal identifiers allow you to grant permissions directly to
+Kubernetes service accounts without additional annotation. Upbound recommends
+this approach for ease-of-use and flexibility.
+
+First, enable Workload Identity Federation on your GKE cluster:
+
+```shell
+gcloud container clusters update ${YOUR_CLUSTER_NAME} \
+ --workload-pool=${YOUR_PROJECT_ID}.svc.id.goog \
+ --region=${YOUR_REGION}
+```
+
+Next, grant the necessary permissions to your Kubernetes service account:
+
+```shell
+gcloud projects add-iam-policy-binding ${YOUR_PROJECT_ID} \
+ --member="principalSet://iam.googleapis.com/projects/${YOUR_PROJECT_NUMBER}/locations/global/workloadIdentityPools/${YOUR_PROJECT_ID}.svc.id.goog/attribute.kubernetes_namespace/${YOUR_CONTROL_PLANE_NAMESPACE}/attribute.kubernetes_service_account/external-secrets-controller" \
+ --role="roles/secretmanager.secretAccessor"
+```
+
+#### Service account impersonation
+
+Service account impersonation allows you to link a Kubernetes service account to
+a GCP service account. The Kubernetes service account assumes the permissions of
+the GCP service account you specify.
+
+Enable workload id federation on your GKE cluster:
+
+```shell
+gcloud container clusters update ${YOUR_CLUSTER_NAME} \
+ --workload-pool=${YOUR_PROJECT_ID}.svc.id.goog \
+ --region=${YOUR_REGION}
+```
+
+Next, create a dedicated service account for your secrets operations:
+
+```shell
+gcloud iam service-accounts create secrets-sa \
+ --project=${YOUR_PROJECT_ID}
+```
+
+Grant secret access permissions to the service account you created:
+
+```shell
+gcloud projects add-iam-policy-binding ${YOUR_PROJECT_ID} \
+ --member="serviceAccount:secrets-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com" \
+ --role="roles/secretmanager.secretAccessor"
+```
+
+Link the Kubernetes service account to the GCP service account:
+
+```shell
+gcloud iam service-accounts add-iam-policy-binding \
+ secrets-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com \
+ --role="roles/iam.workloadIdentityUser" \
+ --member="serviceAccount:${YOUR_PROJECT_ID}.svc.id.goog[${YOUR_CONTROL_PLANE_NAMESPACE}/external-secrets-controller]"
+```
+
+In your control plane, pass the `--set` flag with the Spaces Helm chart
+parameters for the shared secrets component:
+
+```shell
+--set controlPlanes.sharedSecrets.serviceAccount.customAnnotations."iam\.gke\.io/gcp-service-account"="secrets-sa@${YOUR_PROJECT_ID}.iam.gserviceaccount.com"
+```
+
+
+
+## Verify your configuration
+
+After you apply the configuration use `kubectl` to verify the service account
+has the correct annotation:
+
+```shell
+kubectl get serviceaccount external-secrets-controller -n ${YOUR_CONTROL_PLANE_NAMESPACE} -o yaml
+```
+
+
+
+Verify the `external-secrets` pod is running correctly:
+
+```shell
+kubectl get pods -n ${YOUR_CONTROL_PLANE_NAMESPACE} | grep external-secrets
+```
+
+
+
+
+
+Verify the External Secrets Operator pod is running correctly:
+
+```shell
+kubectl get pods -n ${YOUR_CONTROL_PLANE_NAMESPACE} | grep external-secrets
+```
+
+
+
+
+
+Verify the `external-secrets` pod is running correctly:
+
+```shell
+kubectl get pods -n ${YOUR_CONTROL_PLANE_NAMESPACE} | grep external-secrets
+```
+
+
+
+## Restart workload
+
+
+
+You must manually restart a workload's pod when you add the
+`eks.amazonaws.com/role-arn key` annotation to the running pod's service
+account.
+
+This restart enables the EKS pod identity webhook to inject the necessary
+environment for using IRSA.
+
+
+
+
+
+You must manually restart a workload's pod when you add the workload identity annotations to the running pod's service account.
+
+This restart enables the workload identity webhook to inject the necessary
+environment for using Azure workload identity.
+
+
+
+
+
+GCP workload identity doesn't require pod restarts after configuration changes.
+If you do need to restart the workload, use the `kubectl` command to force the
+component restart:
+
+
+
+```shell
+kubectl rollout restart deployment external-secrets
+```
+
+## Use cases
+
+
+
+
+Shared secrets with workload identity eliminates the need for static credentials
+in your cluster. These benefits are particularly helpful in:
+
+* Secure application credentials management
+* Database connection string storage
+* API token management
+* Compliance with secret rotation security standards
+* Multi-environment configuration with centralized secret management
+
+
+
+
+
+Using workload identity authentication for shared secrets eliminates the need for static
+credentials in your cluster as well as the overhead of credential rotation.
+These benefits are particularly helpful in:
+
+* Secure application credentials management
+* Database connection string storage
+* API token management
+* Compliance with secret rotation security standards
+
+
+
+
+
+Configuring the external secrets operator with workload identity eliminates the need for
+static credentials in your cluster and the overhead of credential rotation.
+These benefits are particularly helpful in:
+
+* Secure application credentials management
+* Database connection string storage
+* API token management
+* Compliance with secret rotation security standards
+
+
+
+## Next steps
+
+Now that you have workload identity configured for the shared secrets component, visit
+the [Shared Secrets][eso-guide] guide for more information.
+
+Other workload identity guides are:
+* [Backup and restore][backuprestore]
+* [Billing][billing]
+
+[eso-guide]: /self-hosted-spaces/howtos/secrets-management
+[backuprestore]: /self-hosted-spaces/howtos/workload-id/backup-restore-config
+[billing]: /self-hosted-spaces/howtos/workload-id/billing-config
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/overview/_category_.json b/self-hosted-spaces_versioned_docs/version-1.16/overview/_category_.json
new file mode 100644
index 00000000..54bb1643
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/overview/_category_.json
@@ -0,0 +1,4 @@
+{
+ "label": "Overview",
+ "position": 0
+}
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/overview/index.md b/self-hosted-spaces_versioned_docs/version-1.16/overview/index.md
new file mode 100644
index 00000000..f1fd4de4
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/overview/index.md
@@ -0,0 +1,41 @@
+---
+title: Self-Hosted Spaces
+sidebar_position: 0
+---
+
+Upbound Spaces is the platform for running managed Crossplane control planes at
+scale. Spaces handles the lifecycle, networking, and operations of your control
+planes so you can focus on building your platform.
+
+Crossplane is the open-source foundation that enables infrastructure
+provisioning and management through Kubernetes APIs. The Crossplane control
+plane is a Kubernetes cluster running Crossplane that can provision and manage
+resources across multiple providers.
+
+Upbound can run as a hosted service in our Cloud Space or you can host your own
+Upbound instance as a Self-Hosted Space.
+
+## Cloud Spaces
+
+Upbound hosts and manages the Spaces infrastructure for you. Cloud Spaces offers
+two forms of tenancy:
+
+- **Cloud Spaces**: Multi-tenant, Upbound-hosted and Upbound-managed environment.
+- **Dedicated Spaces**: Single-tenant, Upbound-hosted and Upbound-managed
+ environment with additional isolation guarantees.
+
+Use Cloud Spaces if you want a fully managed SaaS experience with no cluster to
+maintain. See the [Cloud Spaces documentation](/cloud-spaces/overview/).
+
+## Self-Hosted Spaces (you are here)
+
+You run the Spaces software on your own Kubernetes cluster. You deploy and manage Spaces on your own cluster.
+
+Use Self-Hosted Spaces if you need control over your infrastructure or data
+residency.
+
+## Get Started with Self-Hosted Spaces
+
+- **[Concepts](/self-hosted-spaces/concepts/control-planes/)** — Core concepts for Spaces
+- **[How-To Guides](/self-hosted-spaces/howtos/auto-upgrade/)** — Step-by-step guides for operating Spaces
+- **[API Reference](/self-hosted-spaces/reference/)** — API specifications and resources
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/reference/_category_.json b/self-hosted-spaces_versioned_docs/version-1.16/reference/_category_.json
new file mode 100644
index 00000000..4a6a139c
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/reference/_category_.json
@@ -0,0 +1,5 @@
+{
+ "label": "Spaces API",
+ "position": 1,
+ "collapsed": true
+}
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/reference/index.md b/self-hosted-spaces_versioned_docs/version-1.16/reference/index.md
new file mode 100644
index 00000000..8336314e
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/reference/index.md
@@ -0,0 +1,72 @@
+---
+title: Spaces API Reference
+description: Documentation for the Spaces API resources (v1.16 - Latest)
+sidebar_position: 1
+---
+import CrdDocViewer from '@site/src/components/CrdViewer';
+
+
+This page documents the Custom Resource Definitions (CRDs) for the Spaces API.
+
+
+## Control Planes
+### Control Planes
+
+
+## Observability
+### Shared Telemetry Configs
+
+
+## `pkg`
+### Controller Revisions
+
+
+### Controller Runtime Configs
+
+
+### Controllers
+
+
+### Remote Configuration Revisions
+
+
+### Remote Configurations
+
+
+## Proxies
+### Proxies
+
+
+## References
+### Referenced Objects
+
+
+## Scheduling
+### Environments
+
+
+## Secrets
+### Shared External Secrets
+
+
+### Shared Secret Stores
+
+
+## Simulations
+
+
+## Spaces Backups
+### Backups
+
+
+### Backup Schedules
+
+
+### Shared Backup Configs
+
+
+### Shared Backups
+
+
+### Shared Backup Schedules
+
diff --git a/self-hosted-spaces_versioned_docs/version-1.16/self-hosted-spaces-quickstart.md b/self-hosted-spaces_versioned_docs/version-1.16/self-hosted-spaces-quickstart.md
new file mode 100644
index 00000000..4cf4a022
--- /dev/null
+++ b/self-hosted-spaces_versioned_docs/version-1.16/self-hosted-spaces-quickstart.md
@@ -0,0 +1,227 @@
+---
+title: Quickstart with Kind
+sidebar_position: 1
+description: Deploy a self-hosted Upbound Space on a local kind cluster
+tier: "business"
+---
+
+Get started with Upbound Spaces using a local `kind` cluster. This guide walks you through deploying a self-hosted Space, creating your first control plane, and optionally connecting your Space to the Upbound Console.
+
+:::info
+Self-hosted Spaces are a business critical feature of Upbound and require a license token. [Contact Upbound](https://www.upbound.io/contact) if you want to try out self-hosted Spaces.
+:::
+
+## Prerequisites
+
+- An Upbound organization account string, provided by your Upbound account representative
+- A `token.json` license, provided by your Upbound account representative
+- [`kind`](https://kind.sigs.k8s.io/docs/user/quick-start/#installation) installed locally
+- The [`up` CLI](../../../manuals/cli/overview/) v0.37.0 or newer
+
+## Provision a kind cluster
+
+Create a `kind` cluster with the required ingress configuration for Spaces:
+
+```bash
+cat <
+```
+
+Export the path to your license token file:
+
+```bash
+export SPACES_TOKEN_PATH="/path/to/token.json"
+```
+
+Set the Spaces version you want to install:
+
+```bash
+export SPACES_VERSION=
+```
+
+## Install Spaces
+
+Make sure your `kubectl` context is pointed at the `kind` cluster, then install the Spaces software:
+
+```bash
+up space init --organization="${UPBOUND_ACCOUNT}" \
+ --token-file="${SPACES_TOKEN_PATH}" \
+ "v${SPACES_VERSION}"
+```
+
+The `up` CLI automatically detects missing prerequisites and prompts you to install them.
+
+## Connect to your Space
+
+Point your kubeconfig context at the new Space:
+
+```bash
+up ctx disconnected/kind-kind
+```
+
+## Create your first control plane
+
+Create a control plane in your Space:
+
+```bash
+up ctp create controlplane1
+```
+
+The first control plane takes around 5 minutes to reach a `READY` state. Check the status with:
+
+```bash
+up ctp list
+```
+
+## Connect to your control plane
+
+With your kubeconfig still pointed at the Space cluster, connect to the control plane:
+
+```bash
+up ctx ./default/controlplane1
+```
+
+Verify the connection by listing CRDs on the control plane:
+
+```bash
+kubectl get crds
+```
+
+To disconnect and return to your previous context:
+
+```bash
+up ctx -
+```
+
+:::tip
+Learn more about navigating Upbound with the [`up ctx` command reference](../../../manuals/cli/overview/).
+:::
+
+## Connect your Space to Upbound (optional)
+
+You can connect your self-hosted Space to the Upbound Console for a unified operations and debugging experience.
+
+### Prerequisites
+
+- An existing Upbound account
+- The `up` CLI installed and logged into your organization
+- `kubectl` configured with the kubecontext of your Space cluster
+
+### Enable the Query API
+
+Connecting a Space requires the Query API to be enabled. Pass the following flags when running `up space init`:
+
+```bash
+up space init --token-file="${SPACES_TOKEN_PATH}" "v${SPACES_VERSION}" \
+ --set "features.alpha.apollo.enabled=true" \
+ --set "features.alpha.apollo.storage.postgres.create=true"
+```
+
+This creates a PostgreSQL cluster managed by [CloudNativePG](https://cloudnative-pg.io/). To use your own PostgreSQL instance instead, set `features.alpha.apollo.storage.postgres.create=false` and supply connection details at `features.alpha.apollo.storage.postgres.connection`.
+
+### Connect the Space
+
+Set a name for your self-hosted Space:
+
+```bash
+export UPBOUND_SPACE_NAME=your-self-hosted-space
+```
+
+import Tabs from '@theme/Tabs';
+import TabItem from '@theme/TabItem';
+
+
+
+
+Log into Upbound:
+
+```bash
+up login
+```
+
+Connect the Space to the Console:
+
+```bash
+up space connect "${UPBOUND_SPACE_NAME}"
+```
+
+This installs a Connect agent, creates a service account, and configures permissions in the `upbound-system` namespace of your Space.
+
+
+
+
+Export your Upbound org name (run `up org list` to find it):
+
+```bash
+export UPBOUND_ORG_NAME=your-org-name
+```
+
+Create a robot and export its token:
+
+```bash
+up robot create "${UPBOUND_SPACE_NAME}" --description="Robot used for connect agent"
+export UPBOUND_TOKEN=$(up robot token create "${UPBOUND_SPACE_NAME}" "${UPBOUND_SPACE_NAME}-token" -ojson | jq -r .token)
+```
+
+Create a secret containing the robot token:
+
+```bash
+kubectl create secret -n upbound-system generic connect-token \
+ --from-literal=token="${UPBOUND_TOKEN}"
+```
+
+Log into the Helm OCI registry using your license token:
+
+```bash
+jq -r .token $SPACES_TOKEN_PATH | helm registry login xpkg.upbound.io -u $(jq -r .accessId $SPACES_TOKEN_PATH) --password-stdin
+```
+
+Install the connect agent:
+
+```bash
+helm -n upbound-system upgrade --install agent \
+ oci://xpkg.upbound.io/spaces-artifacts/agent \
+ --version "0.0.0-1116.g14cbfe6" \
+ --set "global.space=${UPBOUND_SPACE_NAME}" \
+ --set "global.organization=${UPBOUND_ORG_NAME}" \
+ --set "global.tokenSecret=connect-token" \
+ --set "image.repository=xpkg.upbound.io/spaces-artifacts/agent" \
+ --set "registration.image.repository=xpkg.upbound.io/spaces-artifacts/register-init" \
+ --set "registration.enabled=true" \
+ --set "imagePullSecrets[0].name=upbound-pull-secret" \
+ --set "billing.enabled=false" \
+ --wait
+```
+
+
+
+
+### View your Space in the Console
+
+Go to the [Upbound Console](https://console.upbound.io), log in, and select your newly connected Space from the Space selector.
+
+:::note
+A self-hosted Space can only be connected to a single organization at a time.
+:::
diff --git a/self-hosted-spaces_versioned_sidebars/version-1.16-sidebars.json b/self-hosted-spaces_versioned_sidebars/version-1.16-sidebars.json
new file mode 100644
index 00000000..9cfc6973
--- /dev/null
+++ b/self-hosted-spaces_versioned_sidebars/version-1.16-sidebars.json
@@ -0,0 +1,130 @@
+{
+ "sidebar": [
+ {
+ "type": "doc",
+ "id": "overview/index",
+ "label": "Overview"
+ },
+ {
+ "type": "doc",
+ "id": "self-hosted-spaces-quickstart"
+ },
+ {
+ "type": "category",
+ "label": "Concepts",
+ "items": [
+ "concepts/control-planes",
+ "concepts/groups"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Deploy",
+ "items": [
+ "howtos/deployment-reqs",
+ "howtos/self-hosted-spaces-deployment",
+ "howtos/certs",
+ "howtos/attach-detach",
+ "howtos/query-api",
+ "howtos/mirror-images"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Configure",
+ "items": [
+ "howtos/configure-ha",
+ "howtos/hub-rbac",
+ "howtos/oidc-configuration",
+ "howtos/scaling-resources",
+ "howtos/spaces-management"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Control Planes",
+ "items": [
+ "howtos/managed-service",
+ "howtos/control-plane-topologies",
+ "howtos/auto-upgrade",
+ "howtos/declarative-ctps",
+ "howtos/controllers",
+ "howtos/migrating-to-mcps",
+ "howtos/simulations"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Connect",
+ "items": [
+ "howtos/api-connector",
+ "howtos/ctp-connector",
+ "howtos/mcp-connector-guide",
+ "howtos/query-api"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Observe & Debug",
+ "items": [
+ "howtos/observability",
+ "howtos/space-observability",
+ "howtos/ctp-audit-logs",
+ "howtos/debugging-a-ctp",
+ "howtos/troubleshooting",
+ {
+ "type": "category",
+ "label": "Tracing",
+ "items": [
+ "howtos/tracing/overview",
+ "howtos/tracing/query-api",
+ "howtos/tracing/spaces-api",
+ "howtos/tracing/spaces-router"
+ ]
+ }
+ ]
+ },
+ {
+ "type": "category",
+ "label": "GitOps & Automation",
+ "items": [
+ "howtos/automation-and-gitops/overview",
+ "howtos/gitops",
+ "howtos/use-argo"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Data & Security",
+ "items": [
+ "howtos/backup-and-restore",
+ "howtos/dr",
+ "howtos/secrets-management",
+ {
+ "type": "category",
+ "label": "Workload Identity",
+ "items": [
+ "howtos/workload-id/backup-restore-config",
+ "howtos/workload-id/billing-config",
+ "howtos/workload-id/eso-config"
+ ]
+ }
+ ]
+ },
+ {
+ "type": "category",
+ "label": "Billing & Licensing",
+ "items": [
+ "howtos/billing",
+ "howtos/capacity-licensing"
+ ]
+ },
+ {
+ "type": "category",
+ "label": "API Reference",
+ "items": [
+ "reference/index"
+ ]
+ }
+ ]
+}
diff --git a/self-hosted-spaces_versions.json b/self-hosted-spaces_versions.json
index 17cecbce..88d217db 100644
--- a/self-hosted-spaces_versions.json
+++ b/self-hosted-spaces_versions.json
@@ -1 +1,6 @@
-["1.15", "1.14", "1.13"]
+[
+ "1.16",
+ "1.15",
+ "1.14",
+ "1.13"
+]
diff --git a/src/components/Version.js b/src/components/Version.js
index 3ef59995..e448a768 100644
--- a/src/components/Version.js
+++ b/src/components/Version.js
@@ -1,6 +1,6 @@
export const versions = {
cli: '0.46.0',
- spaces: '1.16.0',
+ spaces: '1.17.0',
aws: '1.23.0',
azure: '1.13.0',
gcp: '1.14.0',
diff --git a/src/theme/DocSidebar/Desktop/Content/index.js b/src/theme/DocSidebar/Desktop/Content/index.js
index 0c1ba6cd..7a2b2eab 100644
--- a/src/theme/DocSidebar/Desktop/Content/index.js
+++ b/src/theme/DocSidebar/Desktop/Content/index.js
@@ -14,7 +14,7 @@ const versionsJson = require('../../../../../self-hosted-spaces_versions.json');
const LATEST = 'latest';
// Must match `versions.current.label` for the self-hosted-spaces plugin in docusaurus.config.js.
-const LATEST_VERSION = '1.16';
+const LATEST_VERSION = '1.17';
const versions = [
{ label: `${LATEST_VERSION} (Latest)`, value: LATEST },
diff --git a/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupconfigs.yaml b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupconfigs.yaml
new file mode 100644
index 00000000..6cf33f3a
--- /dev/null
+++ b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupconfigs.yaml
@@ -0,0 +1,177 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: spacebackupconfigs.admin.spaces.upbound.io
+spec:
+ group: admin.spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SpaceBackupConfig
+ listKind: SpaceBackupConfigList
+ plural: spacebackupconfigs
+ singular: spacebackupconfig
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.objectStorage.provider
+ name: Provider
+ type: string
+ - jsonPath: .spec.objectStorage.bucket
+ name: Bucket
+ type: string
+ - jsonPath: .spec.objectStorage.credentials.source
+ name: Auth
+ type: string
+ - jsonPath: .metadata.annotations.spacebackupconfig\.admin\.internal\.spaces\.upbound\.io/secret
+ name: Secret
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SpaceBackupConfig defines the configuration to backup a Space.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: |-
+ A SpaceBackupConfigSpec represents the configuration to backup or restore
+ a Space.
+ properties:
+ objectStorage:
+ description: ObjectStorage specifies the object storage configuration
+ for the given provider.
+ properties:
+ bucket:
+ description: Bucket is the name of the bucket to store backups
+ in.
+ minLength: 1
+ type: string
+ config:
+ description: |-
+ Config is a free-form map of configuration options for the object storage provider.
+ See https://github.com/thanos-io/objstore?tab=readme-ov-file for more
+ information on the formats for each supported cloud provider. Bucket and
+ Provider will override the required values in the config.
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ credentials:
+ description: Credentials specifies the credentials to access the
+ object storage.
+ properties:
+ env:
+ description: |-
+ Env is a reference to an environment variable that contains credentials
+ that must be used to connect to the provider.
+ properties:
+ name:
+ description: Name is the name of an environment variable.
+ type: string
+ required:
+ - name
+ type: object
+ fs:
+ description: |-
+ Fs is a reference to a filesystem location that contains credentials that
+ must be used to connect to the provider.
+ properties:
+ path:
+ description: Path is a filesystem path.
+ type: string
+ required:
+ - path
+ type: object
+ secretRef:
+ description: |-
+ A SecretRef is a reference to a secret key that contains the credentials
+ that must be used to connect to the provider.
+ properties:
+ key:
+ default: credentials
+ description: The key to select.
+ type: string
+ name:
+ description: Name of the secret.
+ type: string
+ namespace:
+ description: Namespace of the secret.
+ type: string
+ required:
+ - key
+ - name
+ - namespace
+ type: object
+ source:
+ allOf:
+ - enum:
+ - Secret
+ - InjectedIdentity
+ - enum:
+ - Secret
+ - InjectedIdentity
+ description: |-
+ Source of the credentials.
+ Source "Secret" requires "get" permissions on the referenced Secret.
+ type: string
+ required:
+ - source
+ type: object
+ x-kubernetes-validations:
+ - message: secretRef.name and namespace must be set when source
+ is Secret
+ rule: self.source != 'Secret' || (has(self.secretRef) && has(self.secretRef.name)
+ && has(self.secretRef.__namespace__))
+ prefix:
+ description: |-
+ Prefix is the prefix to use for all backups using this
+ SharedBackupConfig, e.g. "prod/cluster1", resulting in backups for
+ controlplane "ctp1" in namespace "ns1" being stored in
+ "prod/cluster1/ns1/ctp1".
+ type: string
+ provider:
+ description: Provider is the name of the object storage provider.
+ enum:
+ - AWS
+ - Azure
+ - GCP
+ type: string
+ required:
+ - bucket
+ - credentials
+ - provider
+ type: object
+ x-kubernetes-validations:
+ - message: credentials.secretRef.name must be set when source is Secret
+ rule: self.credentials.source != 'Secret' || (has(self.credentials.secretRef)
+ && has(self.credentials.secretRef.name))
+ required:
+ - objectStorage
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackups.yaml b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackups.yaml
new file mode 100644
index 00000000..9c7f12c0
--- /dev/null
+++ b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackups.yaml
@@ -0,0 +1,818 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: spacebackups.admin.spaces.upbound.io
+spec:
+ group: admin.spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SpaceBackup
+ listKind: SpaceBackupList
+ plural: spacebackups
+ singular: spacebackup
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .status.retries
+ name: Retries
+ type: integer
+ - jsonPath: .metadata.annotations.spacebackup\.internal\.spaces\.upbound\.io/failed
+ name: Failed
+ type: string
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SpaceBackup represents a backup of a Space.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SpaceBackupSpec defines a backup over a set of Match
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the space backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SpaceBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SpaceBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'admin.spaces.upbound.io')
+ && self.kind == 'SpaceBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneBackups:
+ description: ControlPlaneBackups is the definition of the control
+ plane backups,
+ properties:
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ exclude:
+ description: |-
+ Exclude is the selector for resources that should be excluded from the backup.
+ If both Match and Exclude are specified, the Exclude selector will be applied
+ after the Match selector.
+ By default, only SpaceBackups are excluded.
+ properties:
+ controlPlanes:
+ description: |-
+ ControlPlanes specifies the control planes selected.
+ A control plane is matched if any of the control plane selectors matches, if not specified
+ any control plane in the selected groups is matched.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ extras:
+ description: Extras specifies the extra resources selected.
+ items:
+ description: GenericSpaceBackupResourceSelector represents a
+ generic resource selector.
+ properties:
+ apiGroup:
+ description: APIGroup is the group of the resource.
+ type: string
+ kind:
+ description: Kind is the kind of the resource.
+ type: string
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ required:
+ - apiGroup
+ - kind
+ type: object
+ type: array
+ groups:
+ description: |-
+ Groups specifies the groups selected.
+ A group is matched if any of the group selectors matches, if not specified
+ any group is matched. Group selector is ANDed with all other selectors, so no resource in
+ a group not matching the group selector will be included in the backup.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ secrets:
+ description: Spaces specifies the spaces selected.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ type: object
+ failures:
+ description: Failures defines the failure tolerance for the backup.
+ properties:
+ controlPlanes:
+ anyOf:
+ - type: integer
+ - type: string
+ description: |-
+ ControlPlanes is the percentage of control planes that are allowed to fail and still consider the backup successful.
+ Can be specified as an integer (e.g., 50) or a percentage string (e.g., "50%").
+ x-kubernetes-int-or-string: true
+ type: object
+ match:
+ description: |-
+ Match is the selector for resources that should be included in the backup.
+ By default, we'll back up all Groups and for each Group:
+ - All ControlPlanes.
+ - All Secrets.
+ - All other Space API resources, e.g. SharedBackupConfigs, SharedUpboundPolicies, Backups, etc...
+ properties:
+ controlPlanes:
+ description: |-
+ ControlPlanes specifies the control planes selected.
+ A control plane is matched if any of the control plane selectors matches, if not specified
+ any control plane in the selected groups is matched.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ extras:
+ description: Extras specifies the extra resources selected.
+ items:
+ description: GenericSpaceBackupResourceSelector represents a
+ generic resource selector.
+ properties:
+ apiGroup:
+ description: APIGroup is the group of the resource.
+ type: string
+ kind:
+ description: Kind is the kind of the resource.
+ type: string
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ required:
+ - apiGroup
+ - kind
+ type: object
+ type: array
+ groups:
+ description: |-
+ Groups specifies the groups selected.
+ A group is matched if any of the group selectors matches, if not specified
+ any group is matched. Group selector is ANDed with all other selectors, so no resource in
+ a group not matching the group selector will be included in the backup.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ secrets:
+ description: Spaces specifies the spaces selected.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ type: object
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ required:
+ - configRef
+ type: object
+ x-kubernetes-validations:
+ - message: spec.configRef can't be changed or set after creation
+ rule: '!has(self.configRef) && !has(oldSelf.configRef) || (self.configRef
+ == oldSelf.configRef) '
+ - message: spec.match can't be changed or set after creation
+ rule: '!has(self.match) && !has(oldSelf.match) || (self.match == oldSelf.match) '
+ - message: spec.exclude can't be changed or set after creation
+ rule: '!has(self.exclude) && !has(oldSelf.exclude) || (self.exclude
+ == oldSelf.exclude) '
+ - message: spec.controlPlaneBackups can't be changed or set after creation
+ rule: '!has(self.controlPlaneBackups) && !has(oldSelf.controlPlaneBackups)
+ || (self.controlPlaneBackups == oldSelf.controlPlaneBackups) '
+ status:
+ description: SpaceBackupStatus represents the observed state of a SpaceBackup.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ controlPlanes:
+ description: |-
+ ControlPlanes contains details about the control planes that were backed up,
+ total number of control planes and failures.
+ properties:
+ failed:
+ description: Failed is the number of control planes that failed
+ to backup.
+ format: int32
+ type: integer
+ total:
+ description: Total is the total number of control planes that
+ were attempted to be backed up.
+ format: int32
+ type: integer
+ type: object
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ phase:
+ default: Pending
+ description: Phase is the current phase of the backup.
+ enum:
+ - Pending
+ - InProgress
+ - Failed
+ - Completed
+ - Deleted
+ type: string
+ retries:
+ description: Retries is the number of times the backup has been retried.
+ format: int32
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupschedules.yaml b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupschedules.yaml
new file mode 100644
index 00000000..107254a2
--- /dev/null
+++ b/static/crds/space/v1.17/admin.spaces.upbound.io_spacebackupschedules.yaml
@@ -0,0 +1,801 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: spacebackupschedules.admin.spaces.upbound.io
+spec:
+ group: admin.spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SpaceBackupSchedule
+ listKind: SpaceBackupScheduleList
+ plural: spacebackupschedules
+ singular: spacebackupschedule
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.schedule
+ name: Schedule
+ type: string
+ - jsonPath: .status.lastBackup
+ name: LastBackup
+ type: date
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .spec.suspend
+ name: Suspended
+ type: boolean
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SpaceBackupSchedule represents a schedule to backup a Space.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SpaceBackupScheduleSpec defines a space backup schedule.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the space backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SpaceBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SpaceBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'admin.spaces.upbound.io')
+ && self.kind == 'SpaceBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneBackups:
+ description: ControlPlaneBackups is the definition of the control
+ plane backups,
+ properties:
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ exclude:
+ description: |-
+ Exclude is the selector for resources that should be excluded from the backup.
+ If both Match and Exclude are specified, the Exclude selector will be applied
+ after the Match selector.
+ By default, only SpaceBackups are excluded.
+ properties:
+ controlPlanes:
+ description: |-
+ ControlPlanes specifies the control planes selected.
+ A control plane is matched if any of the control plane selectors matches, if not specified
+ any control plane in the selected groups is matched.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ extras:
+ description: Extras specifies the extra resources selected.
+ items:
+ description: GenericSpaceBackupResourceSelector represents a
+ generic resource selector.
+ properties:
+ apiGroup:
+ description: APIGroup is the group of the resource.
+ type: string
+ kind:
+ description: Kind is the kind of the resource.
+ type: string
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ required:
+ - apiGroup
+ - kind
+ type: object
+ type: array
+ groups:
+ description: |-
+ Groups specifies the groups selected.
+ A group is matched if any of the group selectors matches, if not specified
+ any group is matched. Group selector is ANDed with all other selectors, so no resource in
+ a group not matching the group selector will be included in the backup.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ secrets:
+ description: Spaces specifies the spaces selected.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ type: object
+ failures:
+ description: Failures defines the failure tolerance for the backup.
+ properties:
+ controlPlanes:
+ anyOf:
+ - type: integer
+ - type: string
+ description: |-
+ ControlPlanes is the percentage of control planes that are allowed to fail and still consider the backup successful.
+ Can be specified as an integer (e.g., 50) or a percentage string (e.g., "50%").
+ x-kubernetes-int-or-string: true
+ type: object
+ match:
+ description: |-
+ Match is the selector for resources that should be included in the backup.
+ By default, we'll back up all Groups and for each Group:
+ - All ControlPlanes.
+ - All Secrets.
+ - All other Space API resources, e.g. SharedBackupConfigs, SharedUpboundPolicies, Backups, etc...
+ properties:
+ controlPlanes:
+ description: |-
+ ControlPlanes specifies the control planes selected.
+ A control plane is matched if any of the control plane selectors matches, if not specified
+ any control plane in the selected groups is matched.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ extras:
+ description: Extras specifies the extra resources selected.
+ items:
+ description: GenericSpaceBackupResourceSelector represents a
+ generic resource selector.
+ properties:
+ apiGroup:
+ description: APIGroup is the group of the resource.
+ type: string
+ kind:
+ description: Kind is the kind of the resource.
+ type: string
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ required:
+ - apiGroup
+ - kind
+ type: object
+ type: array
+ groups:
+ description: |-
+ Groups specifies the groups selected.
+ A group is matched if any of the group selectors matches, if not specified
+ any group is matched. Group selector is ANDed with all other selectors, so no resource in
+ a group not matching the group selector will be included in the backup.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ secrets:
+ description: Spaces specifies the spaces selected.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ type: object
+ schedule:
+ description: Schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.
+ minLength: 1
+ type: string
+ suspend:
+ description: |-
+ Suspend specifies whether the schedule is suspended. If true, no
+ SpaceBackups will be created, but running backups will be allowed to
+ complete.
+ type: boolean
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - schedule
+ type: object
+ status:
+ description: SpaceBackupScheduleStatus represents the observed state of
+ a SpaceBackupSchedule.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ lastBackup:
+ description: |-
+ LastBackup is the last time a Backup was run for this
+ Schedule schedule
+ format: date-time
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/admin.spaces.upbound.io_spacelicenses.yaml b/static/crds/space/v1.17/admin.spaces.upbound.io_spacelicenses.yaml
new file mode 100644
index 00000000..c08ea78d
--- /dev/null
+++ b/static/crds/space/v1.17/admin.spaces.upbound.io_spacelicenses.yaml
@@ -0,0 +1,228 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: spacelicenses.admin.spaces.upbound.io
+spec:
+ group: admin.spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SpaceLicense
+ listKind: SpaceLicenseList
+ plural: spacelicenses
+ singular: spacelicense
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.plan
+ name: PLAN
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='LicenseValid')].status
+ name: VALID
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='LicenseValid')].reason
+ name: REASON
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SpaceLicense is the resource for Space license configuration.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SpaceLicenseSpec defines the desired state of SpaceLicense.
+ properties:
+ secretRef:
+ description: |-
+ SecretRef references the secret that contains the license file.
+ If not provided, the license will be considered as community edition.
+ properties:
+ key:
+ default: license.json
+ description: |-
+ Key within the secret that contains the license file.
+ Defaults to "license.json".
+ type: string
+ name:
+ description: Name of the secret containing the license.
+ type: string
+ namespace:
+ description: Namespace of the secret containing the license.
+ type: string
+ required:
+ - name
+ - namespace
+ type: object
+ type: object
+ status:
+ description: SpaceLicenseStatus defines the observed state of SpaceLicense.
+ properties:
+ capacity:
+ description: |-
+ Capacity contains the capacity granted by the license.
+ This entire block is owned by the license-check-controller.
+ properties:
+ operations:
+ description: Operations is the total number of operations granted
+ by the license.
+ format: int64
+ type: integer
+ resourceHours:
+ description: ResourceHours is the total number of resource hours
+ granted by the license.
+ format: int64
+ type: integer
+ type: object
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ createdAt:
+ description: |-
+ CreatedAt is when the license was created.
+ This field is owned by the license-check-controller.
+ format: date-time
+ type: string
+ enabledFeatures:
+ description: |-
+ EnabledFeatures lists the commercial features enabled by this license.
+ This field is owned by the license-check-controller.
+ items:
+ type: string
+ type: array
+ expiresAt:
+ description: |-
+ ExpiresAt is when the license expires.
+ This field is owned by the license-check-controller.
+ format: date-time
+ type: string
+ gracePeriodEndsAt:
+ description: |-
+ GracePeriodEndsAt is when the license grace period ends and the license becomes completely invalid.
+ This field is owned by the license-check-controller.
+ format: date-time
+ type: string
+ id:
+ description: |-
+ ID is the ID associated with the license.
+ This field is owned by the license-check-controller.
+ type: string
+ plan:
+ description: |-
+ Plan is the commercial plan associated with the license (e.g., "community", "standard").
+ This field is owned by the license-check-controller.
+ type: string
+ restrictions:
+ description: |-
+ Restrictions contains any usage restrictions associated with the license.
+ This field is owned by the license-check-controller.
+ properties:
+ clusterUUID:
+ description: |-
+ ClusterUUID specifies the cluster UUID that this license is restricted to.
+ If present, the license is only valid for the cluster with this UUID.
+ type: string
+ type: object
+ usage:
+ description: |-
+ Usage contains the cumulative usage data tracked by the system.
+ This entire block is owned by the metering-controller.
+ properties:
+ firstMeasurement:
+ description: FirstMeasurement is the timestamp of the first usage
+ measurement.
+ format: date-time
+ type: string
+ lastMeasurement:
+ description: LastMeasurement is the timestamp of the last usage
+ measurement.
+ format: date-time
+ type: string
+ operations:
+ description: Operations is the total number of operations consumed.
+ format: int64
+ type: integer
+ operationsUtilization:
+ description: OperationsUtilization is the percentage of operations
+ capacity used.
+ type: string
+ resourceHours:
+ description: ResourceHours is the total number of resource hours
+ consumed.
+ format: int64
+ type: integer
+ resourceHoursUtilization:
+ description: ResourceHoursUtilization is the percentage of resource
+ hours capacity used.
+ type: string
+ type: object
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/authorization.spaces.upbound.io_objectrolebindings.yaml b/static/crds/space/v1.17/authorization.spaces.upbound.io_objectrolebindings.yaml
new file mode 100644
index 00000000..e79bd603
--- /dev/null
+++ b/static/crds/space/v1.17/authorization.spaces.upbound.io_objectrolebindings.yaml
@@ -0,0 +1,153 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: objectrolebindings.authorization.spaces.upbound.io
+spec:
+ group: authorization.spaces.upbound.io
+ names:
+ categories:
+ - iam
+ kind: ObjectRoleBinding
+ listKind: ObjectRoleBindingList
+ plural: objectrolebindings
+ singular: objectrolebinding
+ scope: Namespaced
+ versions:
+ - name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ A ObjectRoleBinding binds a namespaced API object to a set of subjects, at varying access levels.
+ For now, there can be at most one ObjectRoleBinding pointing to each API object.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: ObjectRoleBindingSpec is ObjectRoleBinding's spec.
+ properties:
+ object:
+ description: |-
+ Object references the object to which the listed subjects should have access at varying levels.
+ The object value is immutable after creation.
+ properties:
+ apiGroup:
+ description: |-
+ APIGroup defines the apiGroup of the object being pointed to.
+ With some minor differences, this is essentially matched as a DNS subdomain, like how Kubernetes validates it.
+ The Kubernetes legacy core group is denoted as "core".
+ maxLength: 64
+ pattern: ^[a-z][a-z0-9-]{0,61}[a-z0-9](\.[a-z][a-z0-9-]{0,61}[a-z0-9])*$
+ type: string
+ x-kubernetes-validations:
+ - message: apiGroup is immutable
+ rule: self == oldSelf
+ - message: apiGroup must be 'core' for now. This will change in
+ the future.
+ rule: self == 'core'
+ name:
+ description: |-
+ Name points to the .metadata.name of the object targeted.
+ Kubernetes validates this as a DNS 1123 subdomain.
+ maxLength: 253
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ x-kubernetes-validations:
+ - message: name is immutable
+ rule: self == oldSelf
+ resource:
+ description: |-
+ Resource defines the resource type (often kind in plural, e.g.
+ controlplanes) being pointed to.
+ With some minor differences, this is essentially matched as a DNS label, like how Kubernetes validates it.
+ maxLength: 63
+ pattern: ^[a-z][a-z0-9-]{1,61}[a-z0-9]$
+ type: string
+ x-kubernetes-validations:
+ - message: resource is immutable
+ rule: self == oldSelf
+ - message: resource must be 'namespaces' for now. This will change
+ in the future.
+ rule: self == 'namespaces'
+ required:
+ - apiGroup
+ - name
+ - resource
+ type: object
+ subjects:
+ description: Subjects should be a map type with both kind+name as
+ a key
+ items:
+ description: |-
+ SubjectBinding contains a reference to the object or user identities a role
+ binding applies to.
+ properties:
+ kind:
+ description: |-
+ Kind of subject being referenced. Values defined by this API group are
+ for now only "UpboundTeam".
+ enum:
+ - UpboundTeam
+ type: string
+ x-kubernetes-validations:
+ - message: kind must be 'UpboundTeam' for now. This will change
+ in the future.
+ rule: self == 'UpboundTeam'
+ name:
+ description: |-
+ Name (identifier) of the subject (of the specified kind) being referenced.
+ The identifier must be 2-100 chars, [a-zA-Z0-9-], no repeating dashes, can't start/end with a dash.
+ Notably, a UUID fits that format.
+ maxLength: 100
+ pattern: ^([a-zA-Z0-9]+-?)+[a-zA-Z0-9]$
+ type: string
+ role:
+ description: |-
+ Role this subject has on the associated Object.
+ The list of valid roles is defined for each target API resource separately.
+ For namespaces, valid values are "viewer", "editor", and "admin".
+ The format of this is essentially a RFC 1035 label with underscores instead of dashes, minimum three characters long.
+ maxLength: 63
+ pattern: ^[a-z][a-z0-9_]{1,62}[a-z0-9]$
+ type: string
+ required:
+ - kind
+ - name
+ - role
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - kind
+ - name
+ x-kubernetes-list-type: map
+ required:
+ - object
+ - subjects
+ type: object
+ status:
+ description: ObjectRoleBindingStatus is RoleBindings' status.
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/observability.spaces.upbound.io_sharedtelemetryconfigs.yaml b/static/crds/space/v1.17/observability.spaces.upbound.io_sharedtelemetryconfigs.yaml
new file mode 100644
index 00000000..85c46bc1
--- /dev/null
+++ b/static/crds/space/v1.17/observability.spaces.upbound.io_sharedtelemetryconfigs.yaml
@@ -0,0 +1,416 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedtelemetryconfigs.observability.spaces.upbound.io
+spec:
+ group: observability.spaces.upbound.io
+ names:
+ categories:
+ - observability
+ kind: SharedTelemetryConfig
+ listKind: SharedTelemetryConfigList
+ plural: sharedtelemetryconfigs
+ shortNames:
+ - stc
+ singular: sharedtelemetryconfig
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.annotations.sharedtelemetryconfig\.internal\.spaces\.upbound\.io/selected
+ name: Selected
+ type: string
+ - jsonPath: .metadata.annotations.sharedtelemetryconfig\.internal\.spaces\.upbound\.io/failed
+ name: Failed
+ type: string
+ - jsonPath: .metadata.annotations.sharedtelemetryconfig\.internal\.spaces\.upbound\.io/provisioned
+ name: Provisioned
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Validated')].status
+ name: Validated
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SharedTelemetryConfig defines a telemetry configuration over
+ a set of ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedTelemetryConfigSpec defines a telemetry configuration
+ over a set of ControlPlanes.
+ properties:
+ apiServer:
+ description: |-
+ APIServer configures the API server observability aspects
+ for the target ControlPlanes.
+ properties:
+ audit:
+ description: Audit configures the auditing aspects of the API
+ server.
+ properties:
+ enabled:
+ description: Enabled enables or disables API server auditing
+ for a ControlPlane.
+ type: boolean
+ type: object
+ type: object
+ configPatchSecretRefs:
+ description: |-
+ ConfigPatchSecretRefs allows defining patches sourced from secrets to be
+ applied to the telemetry configuration.
+ items:
+ description: |-
+ ConfigPatchSecretRef defines a config patch sourced from a secret to be
+ applied to the telemetry configuration.
+ properties:
+ key:
+ description: Key in the secret from which to source the patch.
+ type: string
+ name:
+ description: Name of the secret.
+ type: string
+ path:
+ description: |-
+ Path to the field in the telemetry configuration to patch.
+ Currently, we only support patching exporters, so the path
+ needs to start with "exporters".
+ type: string
+ x-kubernetes-validations:
+ - message: Only 'exporters' patching is supported, path must
+ start with 'exporters.'
+ rule: self.startsWith('exporters.')
+ required:
+ - key
+ - name
+ - path
+ type: object
+ type: array
+ controlPlaneSelector:
+ description: |-
+ ControlPlaneSelector defines the selector for ControlPlanes on which to
+ configure telemetry.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ exportPipeline:
+ description: |-
+ ExportPipeline defines the telemetry exporter pipeline to configure on
+ the selected ControlPlanes.
+ properties:
+ logs:
+ description: |-
+ Logs defines the logs exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ metrics:
+ description: |-
+ Metrics defines the metrics exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ traces:
+ description: |-
+ Traces defines the traces exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ type: object
+ exporters:
+ description: |-
+ Exporters defines the exporters to configure on the selected ControlPlanes.
+ Untyped as we use the underlying OpenTelemetryOperator to configure the
+ OpenTelemetry collector's exporters. Use the OpenTelemetry Collector
+ documentation to configure the exporters.
+ Currently only supported exporters are push based exporters.
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ processorPipeline:
+ description: |-
+ ProcessorPipeline defines the telemetry processor pipeline to configure on
+ the selected ControlPlanes.
+ properties:
+ logs:
+ description: |-
+ Logs defines the logs exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ metrics:
+ description: |-
+ Metrics defines the metrics exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ traces:
+ description: |-
+ Traces defines the traces exporter pipeline to configure on the
+ selected ControlPlanes. The value has to be present in the
+ spec.exporters field.
+ items:
+ type: string
+ maxItems: 10
+ type: array
+ type: object
+ processors:
+ description: |-
+ Processors defines the processors to configure on the selected ControlPlanes.
+ Untyped as we use the underlying OpenTelemetryOperator to configure the
+ OpenTelemetry collector's processors. Use the OpenTelemetry Collector
+ documentation to configure the processors.
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ required:
+ - controlPlaneSelector
+ - exportPipeline
+ - exporters
+ type: object
+ status:
+ description: SharedTelemetryConfigStatus represents the observed state
+ of a SharedTelemetryConfig.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ failed:
+ description: list of provisioning failures.
+ items:
+ description: SharedTelemetryConfigProvisioningFailure defines configuration
+ provisioning failure.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition
+ from one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently
+ True, False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ controlPlane:
+ description: ControlPlane name where the failure occurred.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ required:
+ - controlPlane
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - controlPlane
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ provisioned:
+ description: List of successfully provisioned targets.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ selectedControlPlanes:
+ description: SelectedControlPlanes represents the names of the selected
+ ControlPlanes.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/pkg.upbound.io_controllerrevisions.yaml b/static/crds/space/v1.17/pkg.upbound.io_controllerrevisions.yaml
new file mode 100644
index 00000000..be04ba27
--- /dev/null
+++ b/static/crds/space/v1.17/pkg.upbound.io_controllerrevisions.yaml
@@ -0,0 +1,312 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: controllerrevisions.pkg.upbound.io
+spec:
+ group: pkg.upbound.io
+ names:
+ categories:
+ - upbound
+ - pkgrev
+ kind: ControllerRevision
+ listKind: ControllerRevisionList
+ plural: controllerrevisions
+ singular: controllerrevision
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.conditions[?(@.type=='Healthy')].status
+ name: HEALTHY
+ type: string
+ - jsonPath: .spec.revision
+ name: REVISION
+ type: string
+ - jsonPath: .spec.image
+ name: IMAGE
+ type: string
+ - jsonPath: .spec.desiredState
+ name: STATE
+ type: string
+ - jsonPath: .status.foundDependencies
+ name: DEP-FOUND
+ type: string
+ - jsonPath: .status.installedDependencies
+ name: DEP-INSTALLED
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: An ControllerRevision represents a revision of an Controller.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: ControllerRevisionSpec specifies the configuration of an
+ ControllerRevision.
+ properties:
+ commonLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ Map of string keys and values that can be used to organize and categorize
+ (scope and select) objects. May match selectors of replication controllers
+ and services.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
+ type: object
+ desiredState:
+ description: DesiredState of the PackageRevision. Can be either Active
+ or Inactive.
+ type: string
+ helm:
+ description: |-
+ Helm specific configuration for a controller revision. This field is
+ managed by the controller and should not be modified directly.
+ properties:
+ crdRefs:
+ description: CRDRefs is a list of CRDs that deployed by this controller.
+ items:
+ type: string
+ type: array
+ releaseName:
+ description: ReleaseName is the name of the Helm release.
+ type: string
+ releaseNamespace:
+ description: ReleaseNamespace is the namespace of the Helm release.
+ type: string
+ required:
+ - releaseName
+ - releaseNamespace
+ type: object
+ ignoreCrossplaneConstraints:
+ default: false
+ description: |-
+ IgnoreCrossplaneConstraints indicates to the package manager whether to
+ honor Crossplane version constrains specified by the package.
+ Default is false.
+ type: boolean
+ image:
+ description: Package image used by install Pod to extract package
+ contents.
+ type: string
+ packagePullPolicy:
+ default: IfNotPresent
+ description: |-
+ PackagePullPolicy defines the pull policy for the package. It is also
+ applied to any images pulled for the package, such as a provider's
+ controller image.
+ Default is IfNotPresent.
+ type: string
+ packagePullSecrets:
+ description: |-
+ PackagePullSecrets are named secrets in the same namespace that can be
+ used to fetch packages from private registries. They are also applied to
+ any images pulled for the package, such as a provider's controller image.
+ items:
+ description: |-
+ LocalObjectReference contains enough information to let you locate the
+ referenced object inside the same namespace.
+ properties:
+ name:
+ default: ""
+ description: |-
+ Name of the referent.
+ This field is effectively required, but due to backwards compatibility is
+ allowed to be empty. Instances of this type with an empty value here are
+ almost certainly wrong.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ revision:
+ description: |-
+ Revision number. Indicates when the revision will be garbage collected
+ based on the parent's RevisionHistoryLimit.
+ format: int64
+ type: integer
+ runtimeConfigRef:
+ default:
+ name: default
+ description: |-
+ RuntimeConfigRef references a RuntimeConfig resource that will be used
+ to configure the package runtime.
+ properties:
+ apiVersion:
+ default: pkg.upbound.io/v1alpha1
+ description: API version of the referent.
+ type: string
+ kind:
+ default: ControllerRuntimeConfig
+ description: Kind of the referent.
+ type: string
+ name:
+ description: Name of the RuntimeConfig.
+ type: string
+ required:
+ - name
+ type: object
+ skipDependencyResolution:
+ default: false
+ description: |-
+ SkipDependencyResolution indicates to the package manager whether to skip
+ resolving dependencies for a package. Setting this value to true may have
+ unintended consequences.
+ Default is false.
+ type: boolean
+ required:
+ - desiredState
+ - image
+ - revision
+ type: object
+ x-kubernetes-validations:
+ - message: helm specification is immutable
+ rule: '!has(oldSelf.helm) || self.helm == oldSelf.helm'
+ status:
+ description: ControllerRevisionStatus represents the observed state of
+ an ControllerRevision.
+ properties:
+ appliedImageConfigRefs:
+ description: |-
+ AppliedImageConfigRefs records any image configs that were applied in
+ reconciling this revision, and what they were used for.
+ items:
+ description: |-
+ ImageConfigRef is a reference to an image config that indicates how the
+ referenced image config was used by the package manager.
+ properties:
+ name:
+ description: Name is the name of the image config.
+ type: string
+ reason:
+ description: Reason indicates what the image config was used
+ for.
+ type: string
+ required:
+ - name
+ - reason
+ type: object
+ type: array
+ capabilities:
+ description: |-
+ Capabilities of this package. Capabilities are opaque strings that
+ may be meaningful to package consumers.
+ items:
+ type: string
+ type: array
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ foundDependencies:
+ description: Dependency information.
+ format: int64
+ type: integer
+ installedDependencies:
+ format: int64
+ type: integer
+ invalidDependencies:
+ format: int64
+ type: integer
+ objectRefs:
+ description: References to objects owned by PackageRevision.
+ items:
+ description: |-
+ A TypedReference refers to an object by Name, Kind, and APIVersion. It is
+ commonly used to reference cluster-scoped objects or objects where the
+ namespace is already known.
+ properties:
+ apiVersion:
+ description: APIVersion of the referenced object.
+ type: string
+ kind:
+ description: Kind of the referenced object.
+ type: string
+ name:
+ description: Name of the referenced object.
+ type: string
+ uid:
+ description: UID of the referenced object.
+ type: string
+ required:
+ - apiVersion
+ - kind
+ - name
+ type: object
+ type: array
+ resolvedImage:
+ description: |-
+ ResolvedPackage is the name of the package that was installed. It may be
+ different from spec.image if the package path was rewritten using an
+ image config.
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/pkg.upbound.io_controllerruntimeconfigs.yaml b/static/crds/space/v1.17/pkg.upbound.io_controllerruntimeconfigs.yaml
new file mode 100644
index 00000000..6464cd52
--- /dev/null
+++ b/static/crds/space/v1.17/pkg.upbound.io_controllerruntimeconfigs.yaml
@@ -0,0 +1,65 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: controllerruntimeconfigs.pkg.upbound.io
+spec:
+ group: pkg.upbound.io
+ names:
+ categories:
+ - upbound
+ kind: ControllerRuntimeConfig
+ listKind: ControllerRuntimeConfigList
+ plural: controllerruntimeconfigs
+ singular: controllerruntimeconfig
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ An ControllerRuntimeConfig provides settings for configuring runtime of a
+ controller package.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: ControllerRuntimeConfigSpec specifies the configuration of
+ an ControllerRuntimeConfig.
+ properties:
+ helm:
+ description: HelmConfigSpec defines the Helm-specific configuration
+ for a controller runtime.
+ properties:
+ values:
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ type: object
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources: {}
diff --git a/static/crds/space/v1.17/pkg.upbound.io_controllers.yaml b/static/crds/space/v1.17/pkg.upbound.io_controllers.yaml
new file mode 100644
index 00000000..9411b18f
--- /dev/null
+++ b/static/crds/space/v1.17/pkg.upbound.io_controllers.yaml
@@ -0,0 +1,259 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: controllers.pkg.upbound.io
+spec:
+ group: pkg.upbound.io
+ names:
+ categories:
+ - upbound
+ - pkg
+ kind: Controller
+ listKind: ControllerList
+ plural: controllers
+ singular: controller
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.conditions[?(@.type=='Installed')].status
+ name: INSTALLED
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Healthy')].status
+ name: HEALTHY
+ type: string
+ - jsonPath: .spec.package
+ name: PACKAGE
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ A Controller installs an OCI compatible Upbound package, extending a Control
+ Plane with new capabilities.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: ControllerSpec specifies the configuration of a Controller.
+ properties:
+ commonLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ Map of string keys and values that can be used to organize and categorize
+ (scope and select) objects. May match selectors of replication controllers
+ and services.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
+ type: object
+ ignoreCrossplaneConstraints:
+ default: false
+ description: |-
+ IgnoreCrossplaneConstraints indicates to the package manager whether to
+ honor Crossplane version constrains specified by the package.
+ Default is false.
+ type: boolean
+ package:
+ description: |-
+ Package is the name of the package that is being requested.
+ must be a fully qualified image name, including the registry,
+ repository, and tag. for example, "registry.example.com/repo/package:tag".
+ type: string
+ x-kubernetes-validations:
+ - message: must be a fully qualified image name, including the registry,
+ repository, and tag or digest. For example, 'registry.example.com/repo/package:tag'
+ or 'registry.example.com/repo/package[:tag]@sha256:1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef'.
+ rule: self.matches('^[^\\.\\/]+(\\.[^\\.\\/]+)+(\\/[^\\/:@]+)+(:[^:@]+(@sha256.+)?|@sha256.+)$')
+ packagePullPolicy:
+ default: IfNotPresent
+ description: |-
+ PackagePullPolicy defines the pull policy for the package.
+ Default is IfNotPresent.
+ type: string
+ packagePullSecrets:
+ description: |-
+ PackagePullSecrets are named secrets in the same namespace that can be used
+ to fetch packages from private registries.
+ items:
+ description: |-
+ LocalObjectReference contains enough information to let you locate the
+ referenced object inside the same namespace.
+ properties:
+ name:
+ default: ""
+ description: |-
+ Name of the referent.
+ This field is effectively required, but due to backwards compatibility is
+ allowed to be empty. Instances of this type with an empty value here are
+ almost certainly wrong.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ revisionActivationPolicy:
+ default: Automatic
+ description: |-
+ RevisionActivationPolicy specifies how the package controller should
+ update from one revision to the next. Options are Automatic or Manual.
+ Default is Automatic.
+ type: string
+ revisionHistoryLimit:
+ default: 1
+ description: |-
+ RevisionHistoryLimit dictates how the package controller cleans up old
+ inactive package revisions.
+ Defaults to 1. Can be disabled by explicitly setting to 0.
+ format: int64
+ type: integer
+ runtimeConfigRef:
+ default:
+ name: default
+ description: |-
+ RuntimeConfigRef references a RuntimeConfig resource that will be used
+ to configure the package runtime.
+ properties:
+ apiVersion:
+ default: pkg.upbound.io/v1alpha1
+ description: API version of the referent.
+ type: string
+ kind:
+ default: ControllerRuntimeConfig
+ description: Kind of the referent.
+ type: string
+ name:
+ description: Name of the RuntimeConfig.
+ type: string
+ required:
+ - name
+ type: object
+ skipDependencyResolution:
+ default: false
+ description: |-
+ SkipDependencyResolution indicates to the package manager whether to skip
+ resolving dependencies for a package. Setting this value to true may have
+ unintended consequences.
+ Default is false.
+ type: boolean
+ required:
+ - package
+ type: object
+ status:
+ description: ControllerStatus represents the observed state of an Controller.
+ properties:
+ appliedImageConfigRefs:
+ description: |-
+ AppliedImageConfigRefs records any image configs that were applied in
+ reconciling this package, and what they were used for.
+ items:
+ description: |-
+ ImageConfigRef is a reference to an image config that indicates how the
+ referenced image config was used by the package manager.
+ properties:
+ name:
+ description: Name is the name of the image config.
+ type: string
+ reason:
+ description: Reason indicates what the image config was used
+ for.
+ type: string
+ required:
+ - name
+ - reason
+ type: object
+ type: array
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ currentIdentifier:
+ description: |-
+ CurrentIdentifier is the most recent package source that was used to
+ produce a revision. The package manager uses this field to determine
+ whether to check for package updates for a given source when
+ packagePullPolicy is set to IfNotPresent. Manually removing this field
+ will cause the package manager to check that the current revision is
+ correct for the given package source.
+ type: string
+ currentRevision:
+ description: |-
+ CurrentRevision is the name of the current package revision. It will
+ reflect the most up to date revision, whether it has been activated or
+ not.
+ type: string
+ resolvedPackage:
+ description: |-
+ ResolvedPackage is the name of the package that was used for version
+ resolution. It may be different from spec.package if the package path was
+ rewritten using an image config.
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurationrevisions.yaml b/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurationrevisions.yaml
new file mode 100644
index 00000000..0ce40c4b
--- /dev/null
+++ b/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurationrevisions.yaml
@@ -0,0 +1,262 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: remoteconfigurationrevisions.pkg.upbound.io
+spec:
+ group: pkg.upbound.io
+ names:
+ categories:
+ - upbound
+ - pkgrev
+ kind: RemoteConfigurationRevision
+ listKind: RemoteConfigurationRevisionList
+ plural: remoteconfigurationrevisions
+ singular: remoteconfigurationrevision
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.conditions[?(@.type=='Healthy')].status
+ name: HEALTHY
+ type: string
+ - jsonPath: .spec.revision
+ name: REVISION
+ type: string
+ - jsonPath: .spec.image
+ name: IMAGE
+ type: string
+ - jsonPath: .spec.desiredState
+ name: STATE
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: An RemoteConfigurationRevision represents a revision of an RemoteConfiguration.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: RemoteConfigurationRevisionSpec specifies the configuration
+ of an RemoteConfigurationRevision.
+ properties:
+ commonLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ Map of string keys and values that can be used to organize and categorize
+ (scope and select) objects. May match selectors of replication controllers
+ and services.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
+ type: object
+ desiredState:
+ description: DesiredState of the PackageRevision. Can be either Active
+ or Inactive.
+ type: string
+ ignoreCrossplaneConstraints:
+ default: false
+ description: |-
+ IgnoreCrossplaneConstraints indicates to the package manager whether to
+ honor Crossplane version constrains specified by the package.
+ Default is false.
+ type: boolean
+ image:
+ description: Package image used by install Pod to extract package
+ contents.
+ type: string
+ packagePullPolicy:
+ default: IfNotPresent
+ description: |-
+ PackagePullPolicy defines the pull policy for the package. It is also
+ applied to any images pulled for the package, such as a provider's
+ controller image.
+ Default is IfNotPresent.
+ type: string
+ packagePullSecrets:
+ description: |-
+ PackagePullSecrets are named secrets in the same namespace that can be
+ used to fetch packages from private registries. They are also applied to
+ any images pulled for the package, such as a provider's controller image.
+ items:
+ description: |-
+ LocalObjectReference contains enough information to let you locate the
+ referenced object inside the same namespace.
+ properties:
+ name:
+ default: ""
+ description: |-
+ Name of the referent.
+ This field is effectively required, but due to backwards compatibility is
+ allowed to be empty. Instances of this type with an empty value here are
+ almost certainly wrong.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ revision:
+ description: |-
+ Revision number. Indicates when the revision will be garbage collected
+ based on the parent's RevisionHistoryLimit.
+ format: int64
+ type: integer
+ skipDependencyResolution:
+ default: true
+ description: SkipDependencyResolution indicates to the package manager
+ whether to skip resolving dependencies for a package. This is always
+ true for RemoteConfigurationRevision.
+ type: boolean
+ required:
+ - desiredState
+ - image
+ - revision
+ type: object
+ x-kubernetes-validations:
+ - message: skipDependencyResolution must be true
+ rule: self.skipDependencyResolution
+ status:
+ description: RemoteConfigurationRevisionStatus represents the observed
+ state of an RemoteConfigurationRevision.
+ properties:
+ appliedImageConfigRefs:
+ description: |-
+ AppliedImageConfigRefs records any image configs that were applied in
+ reconciling this revision, and what they were used for.
+ items:
+ description: |-
+ ImageConfigRef is a reference to an image config that indicates how the
+ referenced image config was used by the package manager.
+ properties:
+ name:
+ description: Name is the name of the image config.
+ type: string
+ reason:
+ description: Reason indicates what the image config was used
+ for.
+ type: string
+ required:
+ - name
+ - reason
+ type: object
+ type: array
+ capabilities:
+ description: |-
+ Capabilities of this package. Capabilities are opaque strings that
+ may be meaningful to package consumers.
+ items:
+ type: string
+ type: array
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ foundDependencies:
+ description: Dependency information.
+ format: int64
+ type: integer
+ installedDependencies:
+ format: int64
+ type: integer
+ invalidDependencies:
+ format: int64
+ type: integer
+ objectRefs:
+ description: References to objects owned by PackageRevision.
+ items:
+ description: |-
+ A TypedReference refers to an object by Name, Kind, and APIVersion. It is
+ commonly used to reference cluster-scoped objects or objects where the
+ namespace is already known.
+ properties:
+ apiVersion:
+ description: APIVersion of the referenced object.
+ type: string
+ kind:
+ description: Kind of the referenced object.
+ type: string
+ name:
+ description: Name of the referenced object.
+ type: string
+ uid:
+ description: UID of the referenced object.
+ type: string
+ required:
+ - apiVersion
+ - kind
+ - name
+ type: object
+ type: array
+ resolvedImage:
+ description: |-
+ ResolvedPackage is the name of the package that was installed. It may be
+ different from spec.image if the package path was rewritten using an
+ image config.
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurations.yaml b/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurations.yaml
new file mode 100644
index 00000000..352b248b
--- /dev/null
+++ b/static/crds/space/v1.17/pkg.upbound.io_remoteconfigurations.yaml
@@ -0,0 +1,240 @@
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: remoteconfigurations.pkg.upbound.io
+spec:
+ group: pkg.upbound.io
+ names:
+ categories:
+ - upbound
+ - pkg
+ kind: RemoteConfiguration
+ listKind: RemoteConfigurationList
+ plural: remoteconfigurations
+ singular: remoteconfiguration
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.conditions[?(@.type=='Installed')].status
+ name: INSTALLED
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Healthy')].status
+ name: HEALTHY
+ type: string
+ - jsonPath: .spec.package
+ name: PACKAGE
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ A RemoteConfiguration installs an OCI compatible configuration package in
+ remote mode by creating the claim CustomResourceDefinitions only.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: RemoteConfigurationSpec specifies the configuration of a
+ RemoteConfiguration..
+ properties:
+ commonLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ Map of string keys and values that can be used to organize and categorize
+ (scope and select) objects. May match selectors of replication controllers
+ and services.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
+ type: object
+ ignoreCrossplaneConstraints:
+ default: false
+ description: |-
+ IgnoreCrossplaneConstraints indicates to the package manager whether to
+ honor Crossplane version constrains specified by the package.
+ Default is false.
+ type: boolean
+ package:
+ description: |-
+ Package is the name of the package that is being requested.
+ must be a fully qualified image name, including the registry,
+ repository, and tag. for example, "registry.example.com/repo/package:tag".
+ type: string
+ x-kubernetes-validations:
+ - message: must be a fully qualified image name, including the registry,
+ repository, and tag or digest. For example, 'registry.example.com/repo/package:tag'
+ or 'registry.example.com/repo/package[:tag]@sha256:1234567890abcdef1234567890abcdef1234567890abcdef1234567890abcdef'.
+ rule: self.matches('^[^\\.\\/]+(\\.[^\\.\\/]+)+(\\/[^\\/:@]+)+(:[^:@]+(@sha256.+)?|@sha256.+)$')
+ packagePullPolicy:
+ default: IfNotPresent
+ description: |-
+ PackagePullPolicy defines the pull policy for the package.
+ Default is IfNotPresent.
+ type: string
+ packagePullSecrets:
+ description: |-
+ PackagePullSecrets are named secrets in the same namespace that can be used
+ to fetch packages from private registries.
+ items:
+ description: |-
+ LocalObjectReference contains enough information to let you locate the
+ referenced object inside the same namespace.
+ properties:
+ name:
+ default: ""
+ description: |-
+ Name of the referent.
+ This field is effectively required, but due to backwards compatibility is
+ allowed to be empty. Instances of this type with an empty value here are
+ almost certainly wrong.
+ More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ revisionActivationPolicy:
+ default: Automatic
+ description: |-
+ RevisionActivationPolicy specifies how the package controller should
+ update from one revision to the next. Options are Automatic or Manual.
+ Default is Automatic.
+ type: string
+ revisionHistoryLimit:
+ default: 1
+ description: |-
+ RevisionHistoryLimit dictates how the package controller cleans up old
+ inactive package revisions.
+ Defaults to 1. Can be disabled by explicitly setting to 0.
+ format: int64
+ type: integer
+ skipDependencyResolution:
+ default: true
+ description: SkipDependencyResolution indicates to the package manager
+ whether to skip resolving dependencies for a package. This is always
+ true for RemoteConfiguration.
+ type: boolean
+ required:
+ - package
+ type: object
+ x-kubernetes-validations:
+ - message: skipDependencyResolution must be true
+ rule: self.skipDependencyResolution
+ status:
+ description: RemoteConfigurationStatus represents the observed state of
+ a RemoteConfiguration.
+ properties:
+ appliedImageConfigRefs:
+ description: |-
+ AppliedImageConfigRefs records any image configs that were applied in
+ reconciling this package, and what they were used for.
+ items:
+ description: |-
+ ImageConfigRef is a reference to an image config that indicates how the
+ referenced image config was used by the package manager.
+ properties:
+ name:
+ description: Name is the name of the image config.
+ type: string
+ reason:
+ description: Reason indicates what the image config was used
+ for.
+ type: string
+ required:
+ - name
+ - reason
+ type: object
+ type: array
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ currentIdentifier:
+ description: |-
+ CurrentIdentifier is the most recent package source that was used to
+ produce a revision. The package manager uses this field to determine
+ whether to check for package updates for a given source when
+ packagePullPolicy is set to IfNotPresent. Manually removing this field
+ will cause the package manager to check that the current revision is
+ correct for the given package source.
+ type: string
+ currentRevision:
+ description: |-
+ CurrentRevision is the name of the current package revision. It will
+ reflect the most up to date revision, whether it has been activated or
+ not.
+ type: string
+ resolvedPackage:
+ description: |-
+ ResolvedPackage is the name of the package that was used for version
+ resolution. It may be different from spec.package if the package path was
+ rewritten using an image config.
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/references.upbound.io_referencedobjects.yaml b/static/crds/space/v1.17/references.upbound.io_referencedobjects.yaml
new file mode 100644
index 00000000..9e24a807
--- /dev/null
+++ b/static/crds/space/v1.17/references.upbound.io_referencedobjects.yaml
@@ -0,0 +1,303 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: referencedobjects.references.upbound.io
+spec:
+ group: references.upbound.io
+ names:
+ categories:
+ - managed
+ - kubernetes
+ kind: ReferencedObject
+ listKind: ReferencedObjectList
+ plural: referencedobjects
+ singular: referencedobject
+ scope: Cluster
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.forProvider.manifest.kind
+ name: KIND
+ type: string
+ - jsonPath: .spec.composite.kind
+ name: KIND
+ priority: 1
+ type: string
+ - jsonPath: .spec.composite.apiVersion
+ name: APIVERSION
+ priority: 2
+ type: string
+ - jsonPath: .spec.composite.name
+ name: COMPOSITE
+ priority: 1
+ type: string
+ - jsonPath: .spec.composite.JSONPath
+ name: JSONPATH
+ priority: 1
+ type: string
+ - jsonPath: .status.atProvider.manifest.kind
+ name: REFERENCEKIND
+ priority: 1
+ type: string
+ - jsonPath: .status.atProvider.manifest.apiVersion
+ name: REFERENCEAPIVERSION
+ priority: 2
+ type: string
+ - jsonPath: .status.atProvider.manifest.metadata.name
+ name: REFERENCEDNAME
+ priority: 1
+ type: string
+ - jsonPath: .status.atProvider.manifest.metadata.namespace
+ name: REFERENCEDNAMESPACE
+ priority: 1
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Synced')].status
+ name: SYNCED
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Ready')].status
+ name: READY
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ A ReferencedObject represents a Kubernetes object that is referenced by a
+ claim.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: A ObjectSpec defines the desired state of a Object.
+ properties:
+ composite:
+ description: |-
+ Composite is the composite object that holds the reference.
+ The composite must be bound to a claim, that can be local or remote.
+ properties:
+ apiVersion:
+ description: APIVersion of the referencing composite resource.
+ type: string
+ jsonPath:
+ description: |-
+ JSONPath is where the reference is stored in the composite.
+ The reference is resolved in the context of the claim.
+ The JSONPath is expected to end with a object field called `*Ref`, or
+ an array field called `*Refs`. In the former case, the object field must
+ have the following schema. In latter case, each item in the array must:
+
+ apiVersion: string
+ kind: string
+ name: string
+ namespace: string # optional, defaults to be a local reference.
+ UID: string # optional
+ grants: []string # optional, defaults to ["Observe"], but can hold any of
+ ["Observe", "Create", "Update", "Delete"].
+ claims: []string # optional, additional verbs the user must be authorized to.
+
+ Grants are a closed-set, corresponding to the management policy of
+ Crossplane. Grants are authorized through RBAC and Upbound ReBAC for the
+ referenced object when creating or updating a reference.
+
+ Claims are optional verbs the user creating or referencing an object
+ must be authorized to. These can include custom verbs.
+
+ With grants the user specifies the permissions that the claim gives to the
+ composite: "Observe" allows the composite to read the object, "Create" to
+ create it, "Update" to update it, and "Delete" to delete it.
+
+ Claims tell the composition author about additional permissions the user
+ might have.
+
+ OpenAPI v3 validation and defaulting can be used to restrict and/or
+ auto-populate the fields.
+
+ A JSONPath must have a counterpart schema in the CompositeResourceDefinition's
+ references.upbound.io/schema annotation.
+ minLength: 1
+ type: string
+ kind:
+ description: Kind of the referencing composite resource.
+ minLength: 1
+ type: string
+ name:
+ description: Name of the referencing composite resource.
+ minLength: 1
+ type: string
+ required:
+ - apiVersion
+ - jsonPath
+ - kind
+ - name
+ type: object
+ deletionPolicy:
+ default: Delete
+ description: |-
+ DeletionPolicy specifies what will happen to the underlying external
+ when this managed resource is deleted - either "Delete" or "Orphan" the
+ external resource.
+ This field is planned to be deprecated in favor of the ManagementPolicies
+ field in a future release. Currently, both could be set independently and
+ non-default values would be honored if the feature flag is enabled.
+ See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ forProvider:
+ description: ForProvider is the object's desired state.
+ properties:
+ manifest:
+ description: Raw JSON representation of the kubernetes object
+ to be created.
+ type: object
+ x-kubernetes-embedded-resource: true
+ x-kubernetes-preserve-unknown-fields: true
+ required:
+ - manifest
+ type: object
+ managementPolicies:
+ default:
+ - '*'
+ description: |-
+ THIS IS A BETA FIELD. It is on by default but can be opted out
+ through a Crossplane feature flag.
+ ManagementPolicies specify the array of actions Crossplane is allowed to
+ take on the managed and external resources.
+ This field is planned to replace the DeletionPolicy field in a future
+ release. Currently, both could be set independently and non-default
+ values would be honored if the feature flag is enabled. If both are
+ custom, the DeletionPolicy field will be ignored.
+ See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223
+ and this one: https://github.com/crossplane/crossplane/blob/444267e84783136daa93568b364a5f01228cacbe/design/one-pager-ignore-changes.md
+ items:
+ description: |-
+ A ManagementAction represents an action that the Crossplane controllers
+ can take on an external resource.
+ enum:
+ - Observe
+ - Create
+ - Update
+ - Delete
+ - LateInitialize
+ - '*'
+ type: string
+ type: array
+ ownerPolicy:
+ description: |-
+ OwnerPolicy defines how created objects should be owned.
+ 'OnCreate' requires management policy 'Create' or '*'.
+ enum:
+ - OnCreate
+ type: string
+ readiness:
+ default: {}
+ description: Readiness defines how the object's readiness condition
+ should be computed.
+ properties:
+ policy:
+ default: ObjectExists
+ description: Policy defines how the Object's readiness condition
+ should be computed.
+ enum:
+ - WhenSynced
+ - ObjectExists
+ - ObjectReady
+ - ObjectConditionsAllTrue
+ type: string
+ type: object
+ required:
+ - composite
+ type: object
+ status:
+ description: A ObjectStatus represents the observed state of a Object.
+ properties:
+ atProvider:
+ description: AtProvider is the object's observed state.
+ properties:
+ manifest:
+ description: Raw JSON representation of the remote object.
+ type: object
+ x-kubernetes-embedded-resource: true
+ x-kubernetes-preserve-unknown-fields: true
+ type: object
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/scheduling.upbound.io_environments.yaml b/static/crds/space/v1.17/scheduling.upbound.io_environments.yaml
new file mode 100644
index 00000000..1d7da7f6
--- /dev/null
+++ b/static/crds/space/v1.17/scheduling.upbound.io_environments.yaml
@@ -0,0 +1,244 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: environments.scheduling.upbound.io
+spec:
+ group: scheduling.upbound.io
+ names:
+ categories:
+ - scheduling
+ - envs
+ kind: Environment
+ listKind: EnvironmentList
+ plural: environments
+ shortNames:
+ - env
+ singular: environment
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: Environment specifies where remote claims are scheduled to.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: EnvironmentSpec defines the desired state of Environment.
+ properties:
+ dimensions:
+ additionalProperties:
+ type: string
+ description: |-
+ Dimensions are the label keys and values to select control planes
+ implementing the desired API resource group. These dimensions apply to
+ all resource groups uniformly. Per resource group dimensions can
+ be specified in the resource group configuration.
+ type: object
+ resourceGroups:
+ description: |-
+ ResourceGroups define label keys and values and potentially other
+ properties to select a control plane along dimensions for individual
+ API resource groups.
+
+ A resource group not specified in this list will not be scheduled.
+ items:
+ description: ResourceGroup defines the desired scheduling of a resource
+ group.
+ properties:
+ dimensions:
+ additionalProperties:
+ type: string
+ description: |-
+ Dimensions are the label keys and values to select control planes
+ implementing the desired API resource group. These are in addition to
+ the dimensions specified at the .spec level and override them.
+ type: object
+ name:
+ description: Name is the name of the resource group.
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ schedule:
+ description: |-
+ Schedule defines the scheduling result of the resource group. It is
+ set by the scheduler and cannot be mutated by the user. But the user
+ can unset it to allow the scheduler to reschedule the resource group.
+
+ If unset, the resource group will be rescheduled by first setting the
+ proposed schedule in the status and then setting this field here.
+
+ If no scheduling is possible, the Ready condition will be set to False
+ with the NoControlPlaneAvailable reason.
+
+ A schedule will never change unless the user unsets it.
+ items:
+ description: |-
+ ResourceSchedule indicates where instances of a resource group are scheduled to,
+ i.e. by which control plane and in which group and space claims will be
+ implemented.
+ properties:
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the control plane in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ group:
+ description: |-
+ Group is the name of the group in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ name:
+ description: Name is the name of the resource group.
+ minLength: 1
+ type: string
+ space:
+ description: |-
+ Space is the name of the space in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - name
+ x-kubernetes-list-type: map
+ type: object
+ status:
+ description: EnvironmentStatus defines the observed state of the Environment.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ resourceGroups:
+ description: |-
+ ProposedSchedule indicates where instances of a resource group according
+ to the current dimensions are proposed to be scheduled to.
+ items:
+ description: ResourceStatus represents the status of one individual
+ resource group.
+ properties:
+ message:
+ description: Message is a human-readable message for the scheduling
+ decision.
+ type: string
+ name:
+ description: Name is the name of the resource group.
+ minLength: 1
+ type: string
+ proposed:
+ description: |-
+ Proposed is the proposed schedule for the resource group. This either
+ matches the schedule in the spec or is a new proposal by the scheduler.
+
+ In the later case, the user can accept the proposal by removing the
+ existing schedule in the spec for the given resource group.
+ properties:
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the control plane in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ group:
+ description: |-
+ Group is the name of the group in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ space:
+ description: |-
+ Space is the name of the space in which the resource group is scheduled.
+ This is empty if the resource group cannot be scheduled.
+ type: string
+ type: object
+ reason:
+ description: Reason is a machine-readable reason for the scheduling
+ decision.
+ type: string
+ required:
+ - name
+ type: object
+ type: array
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_backups.yaml b/static/crds/space/v1.17/spaces.upbound.io_backups.yaml
new file mode 100644
index 00000000..b4427eff
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_backups.yaml
@@ -0,0 +1,382 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: backups.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: Backup
+ listKind: BackupList
+ plural: backups
+ singular: backup
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .status.retries
+ name: Retries
+ type: integer
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: Backup represents a single backup of a ControlPlane.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: BackupSpec defines a backup over a set of ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the ControlPlane to backup.
+ Requires "backup" permission on the referenced ControlPlane.
+ minLength: 1
+ type: string
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ required:
+ - configRef
+ - controlPlane
+ type: object
+ x-kubernetes-validations:
+ - message: backup target controlplane can not be changed after creation
+ rule: self.controlPlane == oldSelf.controlPlane
+ - message: backup excluded resources can not be changed after creation
+ rule: (!has(self.excludedResources) && !has(oldSelf.excludedResources))
+ || self.excludedResources == oldSelf.excludedResources
+ - message: backup config ref can not be changed after creation
+ rule: self.configRef == oldSelf.configRef
+ status:
+ description: BackupStatus represents the observed state of a Backup.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ phase:
+ default: Pending
+ description: Phase is the current phase of the backup.
+ enum:
+ - Pending
+ - InProgress
+ - Failed
+ - Completed
+ - Deleted
+ type: string
+ retries:
+ description: Retries is the number of times the backup has been retried.
+ format: int32
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
+ - additionalPrinterColumns:
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .status.retries
+ name: Retries
+ type: integer
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: Backup represents a single backup of a ControlPlane.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: BackupSpec defines a backup over a set of ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the ControlPlane to backup.
+ Requires "backup" permission on the referenced ControlPlane.
+ minLength: 1
+ type: string
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ required:
+ - configRef
+ - controlPlane
+ type: object
+ x-kubernetes-validations:
+ - message: backup target controlplane can not be changed after creation
+ rule: self.controlPlane == oldSelf.controlPlane
+ - message: backup excluded resources can not be changed after creation
+ rule: (!has(self.excludedResources) && !has(oldSelf.excludedResources))
+ || self.excludedResources == oldSelf.excludedResources
+ - message: backup config ref can not be changed after creation
+ rule: self.configRef == oldSelf.configRef
+ status:
+ description: BackupStatus represents the observed state of a Backup.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ phase:
+ default: Pending
+ description: Phase is the current phase of the backup.
+ enum:
+ - Pending
+ - InProgress
+ - Failed
+ - Completed
+ - Deleted
+ type: string
+ retries:
+ description: Retries is the number of times the backup has been retried.
+ format: int32
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: false
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_backupschedules.yaml b/static/crds/space/v1.17/spaces.upbound.io_backupschedules.yaml
new file mode 100644
index 00000000..22ffe8cb
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_backupschedules.yaml
@@ -0,0 +1,408 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: backupschedules.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: BackupSchedule
+ listKind: BackupScheduleList
+ plural: backupschedules
+ singular: backupschedule
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.schedule
+ name: Schedule
+ type: string
+ - jsonPath: .status.lastBackup
+ name: LastBackup
+ type: date
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .spec.controlPlane
+ name: ControlPlane
+ type: string
+ - jsonPath: .spec.suspend
+ name: Suspended
+ type: boolean
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: BackupSchedule represents a single ControlPlane schedule for
+ Backups.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: BackupScheduleSpec defines a backup schedule over a set of
+ ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the ControlPlane to which the schedule
+ applies.
+ Requires "get" permission on the referenced ControlPlane.
+ type: string
+ x-kubernetes-validations:
+ - message: target can not be changed after creation
+ rule: self == oldSelf
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ schedule:
+ description: Schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.
+ minLength: 1
+ type: string
+ suspend:
+ description: |-
+ Suspend specifies whether the schedule is suspended. If true, no
+ Backups will be created, but running backups will be allowed to
+ complete.
+ type: boolean
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlane
+ - schedule
+ type: object
+ status:
+ description: BackupScheduleStatus represents the observed state of a BackupSchedule.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ lastBackup:
+ description: |-
+ LastBackup is the last time a Backup was run for this
+ Schedule schedule
+ format: date-time
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
+ - additionalPrinterColumns:
+ - jsonPath: .spec.schedule
+ name: Schedule
+ type: string
+ - jsonPath: .status.lastBackup
+ name: LastBackup
+ type: date
+ - jsonPath: .spec.ttl
+ name: TTL
+ type: string
+ - jsonPath: .spec.controlPlane
+ name: ControlPlane
+ type: string
+ - jsonPath: .spec.suspend
+ name: Suspended
+ type: boolean
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: BackupSchedule represents a single ControlPlane schedule for
+ Backups.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: BackupScheduleSpec defines a backup schedule over a set of
+ ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlane:
+ description: |-
+ ControlPlane is the name of the ControlPlane to which the schedule
+ applies.
+ Requires "get" permission on the referenced ControlPlane.
+ type: string
+ x-kubernetes-validations:
+ - message: target can not be changed after creation
+ rule: self == oldSelf
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ schedule:
+ description: Schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.
+ minLength: 1
+ type: string
+ suspend:
+ description: |-
+ Suspend specifies whether the schedule is suspended. If true, no
+ Backups will be created, but running backups will be allowed to
+ complete.
+ type: boolean
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlane
+ - schedule
+ type: object
+ status:
+ description: BackupScheduleStatus represents the observed state of a BackupSchedule.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ lastBackup:
+ description: |-
+ LastBackup is the last time a Backup was run for this
+ Schedule schedule
+ format: date-time
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: false
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_controlplanes.yaml b/static/crds/space/v1.17/spaces.upbound.io_controlplanes.yaml
new file mode 100644
index 00000000..45e4f79f
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_controlplanes.yaml
@@ -0,0 +1,372 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: controlplanes.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: ControlPlane
+ listKind: ControlPlaneList
+ plural: controlplanes
+ shortNames:
+ - ctp
+ - ctps
+ singular: controlplane
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.crossplane.version
+ name: Crossplane
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Ready')].status
+ name: Ready
+ type: string
+ - jsonPath: .status.message
+ name: Message
+ type: string
+ - jsonPath: .spec.class
+ name: Class
+ priority: 1
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: ControlPlane defines a managed Crossplane instance.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: A ControlPlaneSpec represents the desired state of the ControlPlane.
+ properties:
+ class:
+ description: |-
+ [[GATE:EnableControlPlaneClasses]]
+ Class specifies the class of the control plane. This affects the
+ control plane sizing, including component replicas and resource
+ requirements. There are multiple predefined classes, with "default"
+ being the standard Spaces control plane without any additional class
+ configuration. Check the Upbound Cloud documentation for a list of all
+ available classes. Defaults to the configured default class, if not set.
+ Can only be updated to a compatible class, having the same declared type.
+ type: string
+ crossplane:
+ description: Crossplane defines the configuration for Crossplane.
+ properties:
+ autoUpgrade:
+ default:
+ channel: Stable
+ description: AutoUpgrades defines the auto upgrade configuration
+ for Crossplane.
+ properties:
+ channel:
+ default: Stable
+ description: |-
+ Channel defines the upgrade channels for Crossplane. We support the following channels where 'Stable' is the
+ default:
+ - None: disables auto-upgrades and keeps the control plane at its current version of Crossplane.
+ - Patch: automatically upgrades the control plane to the latest supported patch version when it
+ becomes available while keeping the minor version the same.
+ - Stable: automatically upgrades the control plane to the latest supported patch release on minor
+ version N-1, where N is the latest supported minor version.
+ - Rapid: automatically upgrades the cluster to the latest supported patch release on the latest
+ supported minor version.
+ enum:
+ - None
+ - Patch
+ - Stable
+ - Rapid
+ type: string
+ type: object
+ state:
+ default: Running
+ description: |-
+ State defines the state for crossplane and provider workloads. We support
+ the following states where 'Running' is the default:
+ - Running: Starts/Scales up all crossplane and provider workloads in the ControlPlane
+ - Paused: Pauses/Scales down all crossplane and provider workloads in the ControlPlane
+ enum:
+ - Running
+ - Paused
+ type: string
+ version:
+ description: Version is the version of Universal Crossplane to
+ install.
+ type: string
+ x-kubernetes-validations:
+ - message: The version must not start with a leading 'v'
+ rule: (self.matches('^[^v].*'))
+ type: object
+ hostNamespace:
+ description: |-
+ [[GATE:EnableHostNamespace]]
+ HostNamespace configures the host cluster namespace for this control plane.
+ When set, Spaces provisions the control plane into the namespace specified
+ by hostNamespace.name. If the namespace does not exist, Spaces creates it.
+ hostNamespace.name is immutable after creation.
+ properties:
+ deletionPolicy:
+ default: Delete
+ description: |-
+ DeletionPolicy specifies what happens to the host namespace when the
+ ControlPlane is deleted. Delete (the default) deletes the namespace and
+ all resources inside it. Orphan preserves the namespace and leaves all
+ resources in place; cluster-scoped resources created by Spaces are still
+ removed.
+ enum:
+ - Delete
+ - Orphan
+ type: string
+ name:
+ description: |-
+ Name is the name of the host cluster namespace. If the namespace does not
+ exist, Spaces creates it. Immutable after creation.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ restore:
+ description: Restore specifies details about the control planes restore
+ configuration.
+ properties:
+ finishedAt:
+ description: |-
+ FinishedAt is the time at which the control plane was restored, it's not
+ meant to be set by the user, but rather by the system when the control
+ plane is restored.
+ format: date-time
+ type: string
+ source:
+ description: |-
+ Source of the Backup or BackupSchedule to restore from.
+ Require "restore" permission on the referenced Backup or BackupSchedule.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported kinds are Backup and
+ BackupSchedule at the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being
+ referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: source must be a reference to a Backup or BackupSchedule
+ (v1alpha1)
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && (self.kind == 'Backup' || self.kind == 'BackupSchedule')
+ - message: source is immutable
+ rule: oldSelf == self
+ required:
+ - source
+ type: object
+ x-kubernetes-validations:
+ - message: finishedAt is immutable once set
+ rule: '!has(oldSelf.finishedAt) || oldSelf.finishedAt == self.finishedAt'
+ writeConnectionSecretToRef:
+ description: |-
+ WriteConnectionSecretToReference specifies the namespace and name of a
+ Secret to which any connection details for this managed resource should
+ be written. Connection details frequently include the endpoint, username,
+ and password required to connect to the managed resource.
+ This field is planned to be replaced in a future release in favor of
+ PublishConnectionDetailsTo. Currently, both could be set independently
+ and connection details would be published to both without affecting
+ each other.
+
+ If omitted, it is defaulted to the namespace of the ControlPlane.
+ Deprecated: Use Hub or Upbound identities instead.
+ properties:
+ name:
+ description: Name of the secret.
+ type: string
+ namespace:
+ description: |-
+ Namespace of the secret. If omitted, it is equal to
+ the namespace of the resource containing this reference as a field.
+ type: string
+ required:
+ - name
+ type: object
+ type: object
+ x-kubernetes-validations:
+ - message: restore source can not be unset
+ rule: '!has(oldSelf.restore) || has(self.restore)'
+ - message: restore source can not be set after creation
+ rule: has(oldSelf.restore) || !has(self.restore)
+ - message: '"version" cannot be empty when upgrade channel is "None"'
+ rule: '!has(self.crossplane.autoUpgrade) || self.crossplane.autoUpgrade.channel
+ != "None" || self.crossplane.version != ""'
+ - message: '[[GATE:EnableHostNamespace]] hostNamespace is immutable after
+ creation'
+ rule: (!has(oldSelf.hostNamespace) && !has(self.hostNamespace)) || (has(oldSelf.hostNamespace)
+ && has(self.hostNamespace) && oldSelf.hostNamespace.name == self.hostNamespace.name)
+ status:
+ description: A ControlPlaneStatus represents the observed state of a ControlPlane.
+ properties:
+ class:
+ description: |-
+ [[GATE:EnableControlPlaneClasses]]
+ Class holds the status about the control plane class.
+ properties:
+ current:
+ description: Current holds the actual class of the control plane
+ after a successful transition.
+ type: string
+ history:
+ description: |-
+ History contains a list of the control plane's class transitions and the
+ time they were observed.
+ items:
+ description: ClassTransition represents a record of the control
+ plane's transition to a different class.
+ properties:
+ class:
+ description: |-
+ Class is the class to which the control plane was observed to have
+ transitioned.
+ minLength: 1
+ type: string
+ observedAt:
+ description: |-
+ ObservedAt is the time at which the control plane was observed to have
+ transitioned to the associated class.
+ format: date-time
+ type: string
+ required:
+ - class
+ - observedAt
+ type: object
+ maxItems: 5
+ type: array
+ size:
+ description: |-
+ Size holds the status information about the control plane size,
+ including resource usage.
+ properties:
+ resourceUsage:
+ description: ResourceUsage represents the resource limits
+ and consumption of the control plane.
+ properties:
+ cpu:
+ description: CPU represents the CPU resource usage.
+ type: string
+ memory:
+ description: Memory represents the memory resource usage.
+ type: string
+ storage:
+ description: Storage represents the storage resource usage.
+ type: string
+ type: object
+ type: object
+ type: object
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ controlPlaneID:
+ type: string
+ firstAvailableAt:
+ description: FirstAvailableAt is the time at which the control plane
+ was available for the first time.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ Message is a human-readable message indicating details about why the
+ ControlPlane is in this condition.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ type: object
+ required:
+ - spec
+ type: object
+ x-kubernetes-validations:
+ - message: control plane name cannot exceed 63 characters
+ rule: self.metadata.name.size() <= 63
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_proxies.yaml b/static/crds/space/v1.17/spaces.upbound.io_proxies.yaml
new file mode 100644
index 00000000..ee4939f9
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_proxies.yaml
@@ -0,0 +1,266 @@
+# Copyright 2026 Upbound Inc.
+# All rights reserved
+
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.19.0
+ name: proxies.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: Proxy
+ listKind: ProxyList
+ plural: proxies
+ shortNames:
+ - px
+ singular: proxy
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .status.agentID
+ name: Agent ID
+ priority: 1
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='Ready')].status
+ name: Ready
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ Proxy represents a private-network agent connection point that enables
+ secure communication between Upbound and resources in private networks.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: ProxySpec defines the desired state of a Proxy.
+ properties:
+ agentID:
+ description: |-
+ AgentID is an optional identifier that allows sharing a single
+ private-network agent across multiple proxies. If omitted,
+ a UUID is auto-generated and set in status.agentID.
+ type: string
+ description:
+ description: Description is an optional human-readable description
+ of this Proxy
+ type: string
+ podSelector:
+ description: |-
+ PodSelector specifies which pods should have HTTP_PROXY environment
+ variables injected. Uses standard Kubernetes label selector semantics.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector requirements.
+ The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector applies
+ to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ secretRef:
+ description: |-
+ SecretRef is a reference to a secret containing the robot token used
+ to authenticate the proxy.
+ properties:
+ key:
+ description: Key is the key within the secret that contains the
+ token.
+ type: string
+ name:
+ description: Name of the secret.
+ type: string
+ required:
+ - key
+ - name
+ type: object
+ required:
+ - podSelector
+ - secretRef
+ type: object
+ x-kubernetes-validations:
+ - message: podSelector must specify at least one of matchLabels or matchExpressions;
+ an empty selector would match all pods unintentionally.
+ rule: (has(self.podSelector.matchLabels) && size(self.podSelector.matchLabels)
+ > 0) || (has(self.podSelector.matchExpressions) && size(self.podSelector.matchExpressions)
+ > 0)
+ status:
+ description: ProxyStatus represents the observed state of a Proxy.
+ properties:
+ agentID:
+ description: |-
+ AgentID is the ID for this Proxy. If spec.agentID was
+ provided, this will match that value. Otherwise, it contains the
+ auto-generated UUID.
+ type: string
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ lastAppliedPodSelector:
+ description: |-
+ LastAppliedPodSelector is the podSelector that was last applied.
+ Used to detect selector changes and evict only affected pods.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector requirements.
+ The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector applies
+ to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ phase:
+ description: Phase represents the current state of the Proxy.
+ enum:
+ - WaitingForProxy
+ - Connected
+ - Disconnected
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_sharedbackupconfigs.yaml b/static/crds/space/v1.17/spaces.upbound.io_sharedbackupconfigs.yaml
new file mode 100644
index 00000000..7544c3c0
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_sharedbackupconfigs.yaml
@@ -0,0 +1,268 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedbackupconfigs.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SharedBackupConfig
+ listKind: SharedBackupConfigList
+ plural: sharedbackupconfigs
+ singular: sharedbackupconfig
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.objectStorage.provider
+ name: Provider
+ type: string
+ - jsonPath: .spec.objectStorage.bucket
+ name: Bucket
+ type: string
+ - jsonPath: .spec.objectStorage.credentials.source
+ name: Auth
+ type: string
+ - jsonPath: .spec.objectStorage.credentials.secretRef.name
+ name: Secret
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SharedBackupConfig defines the configuration to backup and restore
+ ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: |-
+ A SharedBackupConfigSpec represents the configuration to backup or restore
+ ControlPlanes.
+ properties:
+ objectStorage:
+ description: ObjectStorage specifies the object storage configuration
+ for the given provider.
+ properties:
+ bucket:
+ description: Bucket is the name of the bucket to store backups
+ in.
+ minLength: 1
+ type: string
+ config:
+ description: |-
+ Config is a free-form map of configuration options for the object storage provider.
+ See https://github.com/thanos-io/objstore?tab=readme-ov-file for more
+ information on the formats for each supported cloud provider. Bucket and
+ Provider will override the required values in the config.
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ credentials:
+ description: Credentials specifies the credentials to access the
+ object storage.
+ properties:
+ secretRef:
+ description: |-
+ A SecretRef is a reference to a secret key that contains the credentials
+ that must be used to connect to the provider.
+ properties:
+ key:
+ default: credentials
+ description: The key to select.
+ type: string
+ name:
+ description: Name of the secret.
+ type: string
+ required:
+ - key
+ - name
+ type: object
+ source:
+ description: |-
+ Source of the credentials.
+ Source "Secret" requires "get" permissions on the referenced Secret.
+ enum:
+ - Secret
+ - InjectedIdentity
+ type: string
+ required:
+ - source
+ type: object
+ prefix:
+ description: |-
+ Prefix is the prefix to use for all backups using this
+ SharedBackupConfig, e.g. "prod/cluster1", resulting in backups for
+ controlplane "ctp1" in namespace "ns1" being stored in
+ "prod/cluster1/ns1/ctp1".
+ type: string
+ provider:
+ description: Provider is the name of the object storage provider.
+ enum:
+ - AWS
+ - Azure
+ - GCP
+ type: string
+ required:
+ - bucket
+ - credentials
+ - provider
+ type: object
+ x-kubernetes-validations:
+ - message: credentials.secretRef.name must be set when source is Secret
+ rule: self.credentials.source != 'Secret' || (has(self.credentials.secretRef)
+ && has(self.credentials.secretRef.name))
+ required:
+ - objectStorage
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
+ - additionalPrinterColumns:
+ - jsonPath: .spec.objectStorage.provider
+ name: Provider
+ type: string
+ - jsonPath: .spec.objectStorage.bucket
+ name: Bucket
+ type: string
+ - jsonPath: .spec.objectStorage.credentials.source
+ name: Auth
+ type: string
+ - jsonPath: .spec.objectStorage.credentials.secretRef.name
+ name: Secret
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: SharedBackupConfig defines the configuration to backup and restore
+ ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: |-
+ A SharedBackupConfigSpec represents the configuration to backup or restore
+ ControlPlanes.
+ properties:
+ objectStorage:
+ description: ObjectStorage specifies the object storage configuration
+ for the given provider.
+ properties:
+ bucket:
+ description: Bucket is the name of the bucket to store backups
+ in.
+ minLength: 1
+ type: string
+ config:
+ description: |-
+ Config is a free-form map of configuration options for the object storage provider.
+ See https://github.com/thanos-io/objstore?tab=readme-ov-file for more
+ information on the formats for each supported cloud provider. Bucket and
+ Provider will override the required values in the config.
+ type: object
+ x-kubernetes-preserve-unknown-fields: true
+ credentials:
+ description: Credentials specifies the credentials to access the
+ object storage.
+ properties:
+ secretRef:
+ description: |-
+ A SecretRef is a reference to a secret key that contains the credentials
+ that must be used to connect to the provider.
+ properties:
+ key:
+ default: credentials
+ description: The key to select.
+ type: string
+ name:
+ description: Name of the secret.
+ type: string
+ required:
+ - key
+ - name
+ type: object
+ source:
+ description: |-
+ Source of the credentials.
+ Source "Secret" requires "get" permissions on the referenced Secret.
+ enum:
+ - Secret
+ - InjectedIdentity
+ type: string
+ required:
+ - source
+ type: object
+ prefix:
+ description: |-
+ Prefix is the prefix to use for all backups using this
+ SharedBackupConfig, e.g. "prod/cluster1", resulting in backups for
+ controlplane "ctp1" in namespace "ns1" being stored in
+ "prod/cluster1/ns1/ctp1".
+ type: string
+ provider:
+ description: Provider is the name of the object storage provider.
+ enum:
+ - AWS
+ - Azure
+ - GCP
+ type: string
+ required:
+ - bucket
+ - credentials
+ - provider
+ type: object
+ x-kubernetes-validations:
+ - message: credentials.secretRef.name must be set when source is Secret
+ rule: self.credentials.source != 'Secret' || (has(self.credentials.secretRef)
+ && has(self.credentials.secretRef.name))
+ required:
+ - objectStorage
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: false
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_sharedbackups.yaml b/static/crds/space/v1.17/spaces.upbound.io_sharedbackups.yaml
new file mode 100644
index 00000000..2b271239
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_sharedbackups.yaml
@@ -0,0 +1,588 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedbackups.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SharedBackup
+ listKind: SharedBackupList
+ plural: sharedbackups
+ singular: sharedbackup
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/completed
+ name: Completed
+ type: string
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/failed
+ name: Failed
+ type: string
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/provisioned
+ name: Provisioned
+ type: string
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: SharedBackup defines a backup over a set of ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedBackupSpec defines a backup over a set of ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneSelector:
+ description: |-
+ ControlPlaneSelector defines the selector for ControlPlanes to backup.
+ Requires "backup" permission on all ControlPlanes in the same namespace.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ failures:
+ description: Failures defines the failure tolerance for the backup.
+ properties:
+ controlPlanes:
+ anyOf:
+ - type: integer
+ - type: string
+ description: |-
+ ControlPlanes is the percentage of control planes that are allowed to fail and still consider the backup successful.
+ Can be specified as an integer (e.g., 50) or a percentage string (e.g., "50%").
+ x-kubernetes-int-or-string: true
+ type: object
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlaneSelector
+ type: object
+ x-kubernetes-validations:
+ - message: shared backup ControlPlane selectors can not be changed after
+ creation
+ rule: self.controlPlaneSelector == oldSelf.controlPlaneSelector
+ - message: shared backup excluded resources can not be changed after creation
+ rule: (!has(self.excludedResources) && !has(oldSelf.excludedResources))
+ || self.excludedResources == oldSelf.excludedResources
+ status:
+ description: SharedBackupStatus represents the observed state of a SharedBackup.
+ properties:
+ completed:
+ description: Completed is the list of ControlPlanes for which the
+ backup completed successfully.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ failed:
+ description: Failed is the list of ControlPlanes for which the backup
+ failed.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ phase:
+ default: Pending
+ description: Phase represents the current phase of the SharedBackup.
+ enum:
+ - Pending
+ - InProgress
+ - Failed
+ - Completed
+ type: string
+ selectedControlPlanes:
+ description: SelectedControlPlanes represents the names of the selected
+ ControlPlanes.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/completed
+ name: Completed
+ type: string
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/failed
+ name: Failed
+ type: string
+ - jsonPath: .metadata.annotations.sharedbackup\.internal\.spaces\.upbound\.io/provisioned
+ name: Provisioned
+ type: string
+ - jsonPath: .status.phase
+ name: Phase
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: SharedBackup defines a backup over a set of ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedBackupSpec defines a backup over a set of ControlPlanes.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneSelector:
+ description: |-
+ ControlPlaneSelector defines the selector for ControlPlanes to backup.
+ Requires "backup" permission on all ControlPlanes in the same namespace.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ failures:
+ description: Failures defines the failure tolerance for the backup.
+ properties:
+ controlPlanes:
+ anyOf:
+ - type: integer
+ - type: string
+ description: |-
+ ControlPlanes is the percentage of control planes that are allowed to fail and still consider the backup successful.
+ Can be specified as an integer (e.g., 50) or a percentage string (e.g., "50%").
+ x-kubernetes-int-or-string: true
+ type: object
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlaneSelector
+ type: object
+ x-kubernetes-validations:
+ - message: shared backup ControlPlane selectors can not be changed after
+ creation
+ rule: self.controlPlaneSelector == oldSelf.controlPlaneSelector
+ - message: shared backup excluded resources can not be changed after creation
+ rule: (!has(self.excludedResources) && !has(oldSelf.excludedResources))
+ || self.excludedResources == oldSelf.excludedResources
+ status:
+ description: SharedBackupStatus represents the observed state of a SharedBackup.
+ properties:
+ completed:
+ description: Completed is the list of ControlPlanes for which the
+ backup completed successfully.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ failed:
+ description: Failed is the list of ControlPlanes for which the backup
+ failed.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ phase:
+ default: Pending
+ description: Phase represents the current phase of the SharedBackup.
+ enum:
+ - Pending
+ - InProgress
+ - Failed
+ - Completed
+ type: string
+ selectedControlPlanes:
+ description: SelectedControlPlanes represents the names of the selected
+ ControlPlanes.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: false
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_sharedbackupschedules.yaml b/static/crds/space/v1.17/spaces.upbound.io_sharedbackupschedules.yaml
new file mode 100644
index 00000000..de9ab159
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_sharedbackupschedules.yaml
@@ -0,0 +1,528 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedbackupschedules.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: SharedBackupSchedule
+ listKind: SharedBackupScheduleList
+ plural: sharedbackupschedules
+ singular: sharedbackupschedule
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.schedule
+ name: Schedule
+ type: string
+ - jsonPath: .spec.suspend
+ name: Suspended
+ type: boolean
+ - jsonPath: .metadata.annotations.sharedbackupschedule\.internal\.spaces\.upbound\.io/provisioned-total
+ name: Provisioned
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ SharedBackupSchedule defines a schedule for SharedBackup on a set of
+ ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedBackupScheduleSpec defines the desired state of a SharedBackupSchedule.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneSelector:
+ description: |-
+ ControlPlaneSelector defines the selector for ControlPlanes to backup.
+ Requires "backup" permission on all ControlPlanes in the same namespace.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ schedule:
+ description: Schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.
+ minLength: 1
+ type: string
+ suspend:
+ description: |-
+ Suspend specifies whether the schedule is suspended. If true, no
+ Backups will be created, but running backups will be allowed to
+ complete.
+ type: boolean
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlaneSelector
+ - schedule
+ type: object
+ status:
+ description: SharedBackupScheduleStatus represents the observed state
+ of a SharedBackupSchedule.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ selectedControlPlanes:
+ description: |-
+ SelectedControlPlanes is the list of ControlPlanes that are selected
+ for backup.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
+ - additionalPrinterColumns:
+ - jsonPath: .spec.schedule
+ name: Schedule
+ type: string
+ - jsonPath: .spec.suspend
+ name: Suspended
+ type: boolean
+ - jsonPath: .metadata.annotations.sharedbackupschedule\.internal\.spaces\.upbound\.io/provisioned-total
+ name: Provisioned
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: Age
+ type: date
+ name: v1beta1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ SharedBackupSchedule defines a schedule for SharedBackup on a set of
+ ControlPlanes.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedBackupScheduleSpec defines the desired state of a SharedBackupSchedule.
+ properties:
+ configRef:
+ description: |-
+ ConfigRef is a reference to the backup configuration.
+ ApiGroup is optional and defaults to "spaces.upbound.io".
+ Kind is required, and the only supported value is "SharedBackupConfig" at
+ the moment.
+ Name is required.
+ properties:
+ apiGroup:
+ description: APIGroup is the group for the resource being referenced.
+ type: string
+ kind:
+ description: Kind is the type of resource being referenced.
+ minLength: 1
+ type: string
+ name:
+ description: Name is the name of resource being referenced.
+ minLength: 1
+ type: string
+ type: object
+ x-kubernetes-map-type: atomic
+ x-kubernetes-validations:
+ - message: backup config ref must be a reference to a SharedBackupConfig
+ rule: (!has(self.apiGroup) || self.apiGroup == 'spaces.upbound.io')
+ && self.kind == 'SharedBackupConfig'
+ - message: backup config ref must have a name
+ rule: size(self.name) > 0
+ controlPlaneSelector:
+ description: |-
+ ControlPlaneSelector defines the selector for ControlPlanes to backup.
+ Requires "backup" permission on all ControlPlanes in the same namespace.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ deletionPolicy:
+ default: Orphan
+ description: DeletionPolicy is the policy for the backup.
+ enum:
+ - Orphan
+ - Delete
+ type: string
+ excludedResources:
+ description: |-
+ ExcludedResources is a slice of resource names that are not
+ included in the backup. Used to filter the included extra resources.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ schedule:
+ description: Schedule in Cron format, see https://en.wikipedia.org/wiki/Cron.
+ minLength: 1
+ type: string
+ suspend:
+ description: |-
+ Suspend specifies whether the schedule is suspended. If true, no
+ Backups will be created, but running backups will be allowed to
+ complete.
+ type: boolean
+ ttl:
+ description: |-
+ TTL is the time to live for the backup. After this time, the backup
+ will be eligible for garbage collection. If not set, the backup will
+ not be garbage collected.
+ type: string
+ useOwnerReferencesInBackup:
+ description: |-
+ UseOwnerReferencesBackup specifies whether an ownership chain should be
+ established between this resource and the Backup it creates.
+ If set to true, the Backup will be garbage collected when this resource
+ is deleted.
+ type: boolean
+ required:
+ - configRef
+ - controlPlaneSelector
+ - schedule
+ type: object
+ status:
+ description: SharedBackupScheduleStatus represents the observed state
+ of a SharedBackupSchedule.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ selectedControlPlanes:
+ description: |-
+ SelectedControlPlanes is the list of ControlPlanes that are selected
+ for backup.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: false
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_sharedexternalsecrets.yaml b/static/crds/space/v1.17/spaces.upbound.io_sharedexternalsecrets.yaml
new file mode 100644
index 00000000..dcf8dd5a
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_sharedexternalsecrets.yaml
@@ -0,0 +1,936 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedexternalsecrets.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - externalsecrets
+ kind: SharedExternalSecret
+ listKind: SharedExternalSecretList
+ plural: sharedexternalsecrets
+ shortNames:
+ - ses
+ singular: sharedexternalsecret
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.annotations.sharedexternalsecrets\.internal\.spaces\.upbound\.io/provisioned-total
+ name: Provisioned
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ SharedExternalSecret specifies a shared ExternalSecret projected into the specified
+ ControlPlanes of the same namespace as ClusterExternalSecret and with that
+ propagated into the specified namespaces.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedExternalSecretSpec defines the desired state of SharedExternalSecret.
+ properties:
+ controlPlaneSelector:
+ description: |-
+ The secret is projected only to control planes
+ matching the provided selector. Either names or a labelSelector must be specified.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ externalSecretMetadata:
+ description: The metadata of the secret store to be created.
+ properties:
+ annotations:
+ additionalProperties:
+ type: string
+ description: Annotations that are set on projected resource.
+ type: object
+ labels:
+ additionalProperties:
+ type: string
+ description: Labels that are set on projected resource.
+ type: object
+ type: object
+ externalSecretName:
+ description: |-
+ ExternalSecretName is the name to use when creating external secret within a control plane.
+ optional, if not set, SharedExternalSecret name will be used.
+ When set, it is immutable.
+ maxLength: 253
+ minLength: 1
+ type: string
+ x-kubernetes-validations:
+ - message: externalSecretName is immutable
+ rule: self == oldSelf
+ externalSecretSpec:
+ description: The spec for the ExternalSecrets to be created.
+ properties:
+ data:
+ description: Data defines the connection between the Kubernetes
+ Secret keys and the Provider data
+ items:
+ description: ExternalSecretData defines the connection between
+ the Kubernetes Secret key (spec.data.) and the Provider
+ data.
+ properties:
+ remoteRef:
+ description: |-
+ RemoteRef points to the remote secret and defines
+ which secret (version/property/..) to fetch.
+ properties:
+ conversionStrategy:
+ default: Default
+ description: Used to define a conversion Strategy
+ enum:
+ - Default
+ - Unicode
+ type: string
+ decodingStrategy:
+ default: None
+ description: Used to define a decoding Strategy
+ enum:
+ - Auto
+ - Base64
+ - Base64URL
+ - None
+ type: string
+ key:
+ description: Key is the key used in the Provider, mandatory
+ type: string
+ metadataPolicy:
+ default: None
+ description: Policy for fetching tags/labels from provider
+ secrets, possible options are Fetch, None. Defaults
+ to None
+ enum:
+ - None
+ - Fetch
+ type: string
+ property:
+ description: Used to select a specific property of the
+ Provider value (if a map), if supported
+ type: string
+ version:
+ description: Used to select a specific version of the
+ Provider value, if supported
+ type: string
+ required:
+ - key
+ type: object
+ secretKey:
+ description: The key in the Kubernetes Secret to store the
+ value.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ sourceRef:
+ description: |-
+ SourceRef allows you to override the source
+ from which the value will be pulled.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ generatorRef:
+ description: |-
+ GeneratorRef points to a generator custom resource.
+
+ Deprecated: The generatorRef is not implemented in .data[].
+ this will be removed with v1.
+ properties:
+ apiVersion:
+ default: generators.external-secrets.io/v1alpha1
+ description: Specify the apiVersion of the generator
+ resource
+ type: string
+ kind:
+ description: Specify the Kind of the generator resource
+ enum:
+ - ACRAccessToken
+ - ClusterGenerator
+ - CloudsmithAccessToken
+ - ECRAuthorizationToken
+ - Fake
+ - GCRAccessToken
+ - GithubAccessToken
+ - QuayAccessToken
+ - Password
+ - SSHKey
+ - STSSessionToken
+ - UUID
+ - VaultDynamicSecret
+ - Webhook
+ - Grafana
+ - MFA
+ type: string
+ name:
+ description: Specify the name of the generator resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ required:
+ - kind
+ - name
+ type: object
+ storeRef:
+ description: SecretStoreRef defines which SecretStore
+ to fetch the ExternalSecret data.
+ properties:
+ kind:
+ description: |-
+ Kind of the SecretStore resource (SecretStore or ClusterSecretStore)
+ Defaults to `SecretStore`
+ enum:
+ - SecretStore
+ - ClusterSecretStore
+ type: string
+ name:
+ description: Name of the SecretStore resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ type: object
+ type: object
+ required:
+ - remoteRef
+ - secretKey
+ type: object
+ type: array
+ dataFrom:
+ description: |-
+ DataFrom is used to fetch all properties from a specific Provider data
+ If multiple entries are specified, the Secret keys are merged in the specified order
+ items:
+ description: |-
+ ExternalSecretDataFromRemoteRef defines the connection between the Kubernetes Secret keys and the Provider data
+ when using DataFrom to fetch multiple values from a Provider.
+ properties:
+ extract:
+ description: |-
+ Used to extract multiple key/value pairs from one secret
+ Note: Extract does not support sourceRef.Generator or sourceRef.GeneratorRef.
+ properties:
+ conversionStrategy:
+ default: Default
+ description: Used to define a conversion Strategy
+ enum:
+ - Default
+ - Unicode
+ type: string
+ decodingStrategy:
+ default: None
+ description: Used to define a decoding Strategy
+ enum:
+ - Auto
+ - Base64
+ - Base64URL
+ - None
+ type: string
+ key:
+ description: Key is the key used in the Provider, mandatory
+ type: string
+ metadataPolicy:
+ default: None
+ description: Policy for fetching tags/labels from provider
+ secrets, possible options are Fetch, None. Defaults
+ to None
+ enum:
+ - None
+ - Fetch
+ type: string
+ property:
+ description: Used to select a specific property of the
+ Provider value (if a map), if supported
+ type: string
+ version:
+ description: Used to select a specific version of the
+ Provider value, if supported
+ type: string
+ required:
+ - key
+ type: object
+ find:
+ description: |-
+ Used to find secrets based on tags or regular expressions
+ Note: Find does not support sourceRef.Generator or sourceRef.GeneratorRef.
+ properties:
+ conversionStrategy:
+ default: Default
+ description: Used to define a conversion Strategy
+ enum:
+ - Default
+ - Unicode
+ type: string
+ decodingStrategy:
+ default: None
+ description: Used to define a decoding Strategy
+ enum:
+ - Auto
+ - Base64
+ - Base64URL
+ - None
+ type: string
+ name:
+ description: Finds secrets based on the name.
+ properties:
+ regexp:
+ description: Finds secrets base
+ type: string
+ type: object
+ path:
+ description: A root path to start the find operations.
+ type: string
+ tags:
+ additionalProperties:
+ type: string
+ description: Find secrets based on tags.
+ type: object
+ type: object
+ rewrite:
+ description: |-
+ Used to rewrite secret Keys after getting them from the secret Provider
+ Multiple Rewrite operations can be provided. They are applied in a layered order (first to last)
+ items:
+ description: ExternalSecretRewrite defines how to rewrite
+ secret data values before they are written to the Secret.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ merge:
+ description: |-
+ Used to merge key/values in one single Secret
+ The resulting key will contain all values from the specified secrets
+ properties:
+ conflictPolicy:
+ default: Error
+ description: Used to define the policy to use
+ in conflict resolution.
+ enum:
+ - Ignore
+ - Error
+ type: string
+ into:
+ default: ""
+ description: |-
+ Used to define the target key of the merge operation.
+ Required if strategy is JSON. Ignored otherwise.
+ type: string
+ priority:
+ description: Used to define key priority in conflict
+ resolution.
+ items:
+ type: string
+ type: array
+ priorityPolicy:
+ default: Strict
+ description: Used to define the policy when a
+ key in the priority list does not exist in the
+ input.
+ enum:
+ - IgnoreNotFound
+ - Strict
+ type: string
+ strategy:
+ default: Extract
+ description: Used to define the strategy to use
+ in the merge operation.
+ enum:
+ - Extract
+ - JSON
+ type: string
+ type: object
+ regexp:
+ description: |-
+ Used to rewrite with regular expressions.
+ The resulting key will be the output of a regexp.ReplaceAll operation.
+ properties:
+ source:
+ description: Used to define the regular expression
+ of a re.Compiler.
+ type: string
+ target:
+ description: Used to define the target pattern
+ of a ReplaceAll operation.
+ type: string
+ required:
+ - source
+ - target
+ type: object
+ transform:
+ description: |-
+ Used to apply string transformation on the secrets.
+ The resulting key will be the output of the template applied by the operation.
+ properties:
+ template:
+ description: |-
+ Used to define the template to apply on the secret name.
+ `.value ` will specify the secret name in the template.
+ type: string
+ required:
+ - template
+ type: object
+ type: object
+ type: array
+ sourceRef:
+ description: |-
+ SourceRef points to a store or generator
+ which contains secret values ready to use.
+ Use this in combination with Extract or Find pull values out of
+ a specific SecretStore.
+ When sourceRef points to a generator Extract or Find is not supported.
+ The generator returns a static map of values
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ generatorRef:
+ description: GeneratorRef points to a generator custom
+ resource.
+ properties:
+ apiVersion:
+ default: generators.external-secrets.io/v1alpha1
+ description: Specify the apiVersion of the generator
+ resource
+ type: string
+ kind:
+ description: Specify the Kind of the generator resource
+ enum:
+ - ACRAccessToken
+ - ClusterGenerator
+ - CloudsmithAccessToken
+ - ECRAuthorizationToken
+ - Fake
+ - GCRAccessToken
+ - GithubAccessToken
+ - QuayAccessToken
+ - Password
+ - SSHKey
+ - STSSessionToken
+ - UUID
+ - VaultDynamicSecret
+ - Webhook
+ - Grafana
+ - MFA
+ type: string
+ name:
+ description: Specify the name of the generator resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ required:
+ - kind
+ - name
+ type: object
+ storeRef:
+ description: SecretStoreRef defines which SecretStore
+ to fetch the ExternalSecret data.
+ properties:
+ kind:
+ description: |-
+ Kind of the SecretStore resource (SecretStore or ClusterSecretStore)
+ Defaults to `SecretStore`
+ enum:
+ - SecretStore
+ - ClusterSecretStore
+ type: string
+ name:
+ description: Name of the SecretStore resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ type: object
+ type: object
+ type: object
+ type: array
+ refreshInterval:
+ default: 1h0m0s
+ description: |-
+ RefreshInterval is the amount of time before the values are read again from the SecretStore provider,
+ specified as Golang Duration strings.
+ Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h"
+ Example values: "1h0m0s", "2h30m0s", "10m0s"
+ May be set to "0s" to fetch and create it once. Defaults to 1h0m0s.
+ type: string
+ refreshPolicy:
+ description: |-
+ RefreshPolicy determines how the ExternalSecret should be refreshed:
+ - CreatedOnce: Creates the Secret only if it does not exist and does not update it thereafter
+ - Periodic: Synchronizes the Secret from the external source at regular intervals specified by refreshInterval.
+ No periodic updates occur if refreshInterval is 0.
+ - OnChange: Only synchronizes the Secret when the ExternalSecret's metadata or specification changes
+ enum:
+ - CreatedOnce
+ - Periodic
+ - OnChange
+ type: string
+ secretStoreRef:
+ description: SecretStoreRef defines which SecretStore to fetch
+ the ExternalSecret data.
+ properties:
+ kind:
+ description: |-
+ Kind of the SecretStore resource (SecretStore or ClusterSecretStore)
+ Defaults to `SecretStore`
+ enum:
+ - SecretStore
+ - ClusterSecretStore
+ type: string
+ name:
+ description: Name of the SecretStore resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ type: object
+ target:
+ default:
+ creationPolicy: Owner
+ deletionPolicy: Retain
+ description: |-
+ ExternalSecretTarget defines the Kubernetes Secret to be created,
+ there can be only one target per ExternalSecret.
+ properties:
+ creationPolicy:
+ default: Owner
+ description: |-
+ CreationPolicy defines rules on how to create the resulting Secret.
+ Defaults to "Owner"
+ enum:
+ - Owner
+ - Orphan
+ - Merge
+ - None
+ type: string
+ deletionPolicy:
+ default: Retain
+ description: |-
+ DeletionPolicy defines rules on how to delete the resulting Secret.
+ Defaults to "Retain"
+ enum:
+ - Delete
+ - Merge
+ - Retain
+ type: string
+ immutable:
+ description: Immutable defines if the final secret will be
+ immutable
+ type: boolean
+ manifest:
+ description: |-
+ Manifest defines a custom Kubernetes resource to create instead of a Secret.
+ When specified, ExternalSecret will create the resource type defined here
+ (e.g., ConfigMap, Custom Resource) instead of a Secret.
+ Warning: Using Generic target. Make sure access policies and encryption are properly configured.
+ properties:
+ apiVersion:
+ description: APIVersion of the target resource (e.g.,
+ "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD
+ Application)
+ minLength: 1
+ type: string
+ kind:
+ description: Kind of the target resource (e.g., "ConfigMap",
+ "Application")
+ minLength: 1
+ type: string
+ required:
+ - apiVersion
+ - kind
+ type: object
+ name:
+ description: |-
+ The name of the Secret resource to be managed.
+ Defaults to the .metadata.name of the ExternalSecret resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ template:
+ description: Template defines a blueprint for the created
+ Secret resource.
+ properties:
+ data:
+ additionalProperties:
+ type: string
+ type: object
+ engineVersion:
+ default: v2
+ description: |-
+ EngineVersion specifies the template engine version
+ that should be used to compile/execute the
+ template specified in .data and .templateFrom[].
+ enum:
+ - v2
+ type: string
+ mergePolicy:
+ default: Replace
+ description: TemplateMergePolicy defines how the rendered
+ template should be merged with the existing Secret data.
+ enum:
+ - Replace
+ - Merge
+ type: string
+ metadata:
+ description: ExternalSecretTemplateMetadata defines metadata
+ fields for the Secret blueprint.
+ properties:
+ annotations:
+ additionalProperties:
+ type: string
+ type: object
+ finalizers:
+ items:
+ type: string
+ type: array
+ labels:
+ additionalProperties:
+ type: string
+ type: object
+ type: object
+ templateFrom:
+ items:
+ description: |-
+ TemplateFrom specifies a source for templates.
+ Each item in the list can either reference a ConfigMap or a Secret resource.
+ properties:
+ configMap:
+ description: TemplateRef specifies a reference to
+ either a ConfigMap or a Secret resource.
+ properties:
+ items:
+ description: A list of keys in the ConfigMap/Secret
+ to use as templates for Secret data
+ items:
+ description: TemplateRefItem specifies a key
+ in the ConfigMap/Secret to use as a template
+ for Secret data.
+ properties:
+ key:
+ description: A key in the ConfigMap/Secret
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ templateAs:
+ default: Values
+ description: TemplateScope specifies how
+ the template keys should be interpreted.
+ enum:
+ - Values
+ - KeysAndValues
+ type: string
+ required:
+ - key
+ type: object
+ type: array
+ name:
+ description: The name of the ConfigMap/Secret
+ resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ required:
+ - items
+ - name
+ type: object
+ literal:
+ type: string
+ secret:
+ description: TemplateRef specifies a reference to
+ either a ConfigMap or a Secret resource.
+ properties:
+ items:
+ description: A list of keys in the ConfigMap/Secret
+ to use as templates for Secret data
+ items:
+ description: TemplateRefItem specifies a key
+ in the ConfigMap/Secret to use as a template
+ for Secret data.
+ properties:
+ key:
+ description: A key in the ConfigMap/Secret
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ templateAs:
+ default: Values
+ description: TemplateScope specifies how
+ the template keys should be interpreted.
+ enum:
+ - Values
+ - KeysAndValues
+ type: string
+ required:
+ - key
+ type: object
+ type: array
+ name:
+ description: The name of the ConfigMap/Secret
+ resource
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ required:
+ - items
+ - name
+ type: object
+ target:
+ default: Data
+ description: |-
+ Target specifies where to place the template result.
+ For Secret resources, common values are: "Data", "Annotations", "Labels".
+ For custom resources (when spec.target.manifest is set), this supports
+ nested paths like "spec.database.config" or "data".
+ type: string
+ type: object
+ type: array
+ type:
+ type: string
+ type: object
+ type: object
+ type: object
+ namespaceSelector:
+ description: |-
+ The projected secret can be consumed
+ only within namespaces matching the provided selector.
+ Either names or a labelSelector must be specified.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ refreshTime:
+ description: Used to configure secret refresh interval in seconds.
+ type: string
+ required:
+ - controlPlaneSelector
+ - externalSecretSpec
+ - namespaceSelector
+ type: object
+ x-kubernetes-validations:
+ - message: externalSecretName is immutable
+ rule: has(self.externalSecretName) == has(oldSelf.externalSecretName)
+ status:
+ description: SharedExternalSecretStatus defines the observed state of
+ the ExternalSecret.
+ properties:
+ failed:
+ description: list of provisioning failures.
+ items:
+ description: |-
+ SharedExternalSecretProvisioningFailure describes a external secret provisioning
+ failure in a specific control plane.
+ properties:
+ conditions:
+ description: List of conditions.
+ items:
+ description: ClusterExternalSecretStatusCondition defines
+ the observed state of a ClusterExternalSecret resource.
+ properties:
+ message:
+ type: string
+ status:
+ type: string
+ type:
+ description: ClusterExternalSecretConditionType defines
+ a value type for ClusterExternalSecret conditions.
+ type: string
+ required:
+ - status
+ - type
+ type: object
+ type: array
+ controlPlane:
+ description: ControlPlane name where the failure occurred.
+ type: string
+ required:
+ - controlPlane
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - controlPlane
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: observed resource generation.
+ format: int64
+ type: integer
+ provisioned:
+ description: List of successfully provisioned targets.
+ items:
+ description: SharedExternalSecretProvisioningSuccess defines external
+ secret provisioning success.
+ properties:
+ controlPlane:
+ description: ControlPlane name where the external secret got
+ successfully projected.
+ type: string
+ required:
+ - controlPlane
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - controlPlane
+ x-kubernetes-list-type: map
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_sharedsecretstores.yaml b/static/crds/space/v1.17/spaces.upbound.io_sharedsecretstores.yaml
new file mode 100644
index 00000000..b792d0e6
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_sharedsecretstores.yaml
@@ -0,0 +1,6362 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: sharedsecretstores.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - externalsecrets
+ kind: SharedSecretStore
+ listKind: SharedSecretStoreList
+ plural: sharedsecretstores
+ shortNames:
+ - sss
+ singular: sharedsecretstore
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .metadata.annotations.sharedsecretstores\.internal\.spaces\.upbound\.io/provisioned-total
+ name: Provisioned
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ SharedSecretStore represents a shared SecretStore projected as ClusterSecretStore
+ into matching ControlPlanes in the same namespace. Once projected into a ControlPlane,
+ it can be referenced from ExternalSecret instances, as part of `storeRef` fields.
+ The secret store configuration including referenced credential are not leaked into the
+ ControlPlanes and in that sense can be called secure as they are invisible to the
+ ControlPlane workloads.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SharedSecretStoreSpec defines the desired state of SecretStore.
+ properties:
+ controlPlaneSelector:
+ description: |-
+ The store is projected only to control planes
+ matching the provided selector. Either names or a labelSelector must be specified.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ namespaceSelector:
+ description: |-
+ The projected secret store can be consumed
+ only within namespaces matching the provided selector.
+ Either names or a labelSelector must be specified.
+ properties:
+ labelSelectors:
+ description: |-
+ A resource is matched if any of the label selector matches.
+ In case when the list is empty, resource is matched too.
+ items:
+ description: |-
+ A label selector is a label query over a set of resources. The result of matchLabels and
+ matchExpressions are ANDed. An empty label selector matches all objects. A null
+ label selector matches no objects.
+ properties:
+ matchExpressions:
+ description: matchExpressions is a list of label selector
+ requirements. The requirements are ANDed.
+ items:
+ description: |-
+ A label selector requirement is a selector that contains values, a key, and an operator that
+ relates the key and values.
+ properties:
+ key:
+ description: key is the label key that the selector
+ applies to.
+ type: string
+ operator:
+ description: |-
+ operator represents a key's relationship to a set of values.
+ Valid operators are In, NotIn, Exists and DoesNotExist.
+ type: string
+ values:
+ description: |-
+ values is an array of string values. If the operator is In or NotIn,
+ the values array must be non-empty. If the operator is Exists or DoesNotExist,
+ the values array must be empty. This array is replaced during a strategic
+ merge patch.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: atomic
+ required:
+ - key
+ - operator
+ type: object
+ type: array
+ x-kubernetes-list-type: atomic
+ matchLabels:
+ additionalProperties:
+ type: string
+ description: |-
+ matchLabels is a map of {key,value} pairs. A single {key,value} in the matchLabels
+ map is equivalent to an element of matchExpressions, whose key field is "key", the
+ operator is "In", and the values array contains only "value". The requirements are ANDed.
+ type: object
+ type: object
+ x-kubernetes-map-type: atomic
+ type: array
+ names:
+ description: |-
+ A resource is selected if its metadata.name matches any of the provided names.
+ In case when the list is empty, resource is matched too.
+ items:
+ type: string
+ type: array
+ x-kubernetes-list-type: set
+ type: object
+ x-kubernetes-validations:
+ - message: either names or a labelSelector must be specified
+ rule: (has(self.labelSelectors) || has(self.names)) && (size(self.labelSelectors)
+ > 0 || size(self.names) > 0)
+ provider:
+ description: Used to configure the provider. Only one provider may
+ be set.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ akeyless:
+ description: Akeyless configures this store to sync secrets using
+ Akeyless Vault provider
+ properties:
+ akeylessGWApiURL:
+ description: Akeyless GW API Url from which the secrets to
+ be fetched from.
+ type: string
+ authSecretRef:
+ description: Auth configures how the operator authenticates
+ with Akeyless.
+ properties:
+ kubernetesAuth:
+ description: |-
+ Kubernetes authenticates with Akeyless by passing the ServiceAccount
+ token stored in the named Secret resource.
+ properties:
+ accessID:
+ description: the Akeyless Kubernetes auth-method access-id
+ type: string
+ k8sConfName:
+ description: Kubernetes-auth configuration name in
+ Akeyless-Gateway
+ type: string
+ secretRef:
+ description: |-
+ Optional secret field containing a Kubernetes ServiceAccount JWT used
+ for authenticating with Akeyless. If a name is specified without a key,
+ `token` is the default. If one is not specified, the one bound to
+ the controller will be used.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ serviceAccountRef:
+ description: |-
+ Optional service account field containing the name of a kubernetes ServiceAccount.
+ If the service account is specified, the service account secret token JWT will be used
+ for authenticating with Akeyless. If the service account selector is not supplied,
+ the secretRef will be used instead.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - accessID
+ - k8sConfName
+ type: object
+ secretRef:
+ description: |-
+ Reference to a Secret that contains the details
+ to authenticate with Akeyless.
+ properties:
+ accessID:
+ description: The SecretAccessID is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ accessType:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ accessTypeParam:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ type: object
+ caBundle:
+ description: |-
+ PEM/base64 encoded CA bundle used to validate Akeyless Gateway certificate. Only used
+ if the AkeylessGWApiURL URL is using HTTPS protocol. If not set the system root certificates
+ are used to validate the TLS connection.
+ format: byte
+ type: string
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ Akeyless Gateway certificate.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ required:
+ - akeylessGWApiURL
+ - authSecretRef
+ type: object
+ aws:
+ description: AWS configures this store to sync secrets using AWS
+ Secret Manager provider
+ properties:
+ additionalRoles:
+ description: AdditionalRoles is a chained list of Role ARNs
+ which the provider will sequentially assume before assuming
+ the Role
+ items:
+ type: string
+ type: array
+ auth:
+ description: |-
+ Auth defines the information necessary to authenticate against AWS
+ if not set aws sdk will infer credentials from your environment
+ see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials
+ properties:
+ jwt:
+ description: AWSJWTAuth stores reference to Authenticate
+ against AWS using service account tokens.
+ properties:
+ serviceAccountRef:
+ description: ServiceAccountSelector is a reference
+ to a ServiceAccount resource.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ type: object
+ secretRef:
+ description: |-
+ AWSAuthSecretRef holds secret references for AWS credentials
+ both AccessKeyID and SecretAccessKey must be defined in order to properly authenticate.
+ properties:
+ accessKeyIDSecretRef:
+ description: The AccessKeyID is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ secretAccessKeySecretRef:
+ description: The SecretAccessKey is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ sessionTokenSecretRef:
+ description: |-
+ The SessionToken used for authentication
+ This must be defined if AccessKeyID and SecretAccessKey are temporary credentials
+ see: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ type: object
+ externalID:
+ description: AWS External ID set on assumed IAM roles
+ type: string
+ prefix:
+ description: Prefix adds a prefix to all retrieved values.
+ type: string
+ region:
+ description: AWS Region to be used for the provider
+ type: string
+ role:
+ description: Role is a Role ARN which the provider will assume
+ type: string
+ secretsManager:
+ description: SecretsManager defines how the provider behaves
+ when interacting with AWS SecretsManager
+ properties:
+ forceDeleteWithoutRecovery:
+ description: |-
+ Specifies whether to delete the secret without any recovery window. You
+ can't use both this parameter and RecoveryWindowInDays in the same call.
+ If you don't use either, then by default Secrets Manager uses a 30 day
+ recovery window.
+ see: https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html#SecretsManager-DeleteSecret-request-ForceDeleteWithoutRecovery
+ type: boolean
+ recoveryWindowInDays:
+ description: |-
+ The number of days from 7 to 30 that Secrets Manager waits before
+ permanently deleting the secret. You can't use both this parameter and
+ ForceDeleteWithoutRecovery in the same call. If you don't use either,
+ then by default Secrets Manager uses a 30-day recovery window.
+ see: https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_DeleteSecret.html#SecretsManager-DeleteSecret-request-RecoveryWindowInDays
+ format: int64
+ type: integer
+ type: object
+ service:
+ description: Service defines which service should be used
+ to fetch the secrets
+ enum:
+ - SecretsManager
+ - ParameterStore
+ type: string
+ sessionTags:
+ description: AWS STS assume role session tags
+ items:
+ description: |-
+ Tag is a key-value pair that can be attached to an AWS resource.
+ see: https://docs.aws.amazon.com/general/latest/gr/aws_tagging.html
+ properties:
+ key:
+ type: string
+ value:
+ type: string
+ required:
+ - key
+ - value
+ type: object
+ type: array
+ transitiveTagKeys:
+ description: AWS STS assume role transitive session tags.
+ Required when multiple rules are used with the provider
+ items:
+ type: string
+ type: array
+ required:
+ - region
+ - service
+ type: object
+ azurekv:
+ description: AzureKV configures this store to sync secrets using
+ Azure Key Vault provider
+ properties:
+ authSecretRef:
+ description: Auth configures how the operator authenticates
+ with Azure. Required for ServicePrincipal auth type. Optional
+ for WorkloadIdentity.
+ properties:
+ clientCertificate:
+ description: The Azure ClientCertificate of the service
+ principle used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ clientId:
+ description: The Azure clientId of the service principle
+ or managed identity used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ clientSecret:
+ description: The Azure ClientSecret of the service principle
+ used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ tenantId:
+ description: The Azure tenantId of the managed identity
+ used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ authType:
+ default: ServicePrincipal
+ description: |-
+ Auth type defines how to authenticate to the keyvault service.
+ Valid values are:
+ - "ServicePrincipal" (default): Using a service principal (tenantId, clientId, clientSecret)
+ - "ManagedIdentity": Using Managed Identity assigned to the pod (see aad-pod-identity)
+ enum:
+ - ServicePrincipal
+ - ManagedIdentity
+ - WorkloadIdentity
+ type: string
+ customCloudConfig:
+ description: |-
+ CustomCloudConfig defines custom Azure endpoints for non-standard clouds.
+ Required when EnvironmentType is AzureStackCloud.
+ Optional for other environment types - useful for Azure China when using Workload Identity
+ with AKS, where the OIDC issuer (login.partner.microsoftonline.cn) differs from the
+ standard China Cloud endpoint (login.chinacloudapi.cn).
+ IMPORTANT: This feature REQUIRES UseAzureSDK to be set to true. Custom cloud
+ configuration is not supported with the legacy go-autorest SDK.
+ properties:
+ activeDirectoryEndpoint:
+ description: |-
+ ActiveDirectoryEndpoint is the AAD endpoint for authentication
+ Required when using custom cloud configuration
+ type: string
+ keyVaultDNSSuffix:
+ description: KeyVaultDNSSuffix is the DNS suffix for Key
+ Vault URLs
+ type: string
+ keyVaultEndpoint:
+ description: KeyVaultEndpoint is the Key Vault service
+ endpoint
+ type: string
+ resourceManagerEndpoint:
+ description: ResourceManagerEndpoint is the Azure Resource
+ Manager endpoint
+ type: string
+ required:
+ - activeDirectoryEndpoint
+ type: object
+ environmentType:
+ default: PublicCloud
+ description: |-
+ EnvironmentType specifies the Azure cloud environment endpoints to use for
+ connecting and authenticating with Azure. By default it points to the public cloud AAD endpoint.
+ The following endpoints are available, also see here: https://github.com/Azure/go-autorest/blob/main/autorest/azure/environments.go#L152
+ PublicCloud, USGovernmentCloud, ChinaCloud, GermanCloud, AzureStackCloud
+ Use AzureStackCloud when you need to configure custom Azure Stack Hub or Azure Stack Edge endpoints.
+ enum:
+ - PublicCloud
+ - USGovernmentCloud
+ - ChinaCloud
+ - GermanCloud
+ - AzureStackCloud
+ type: string
+ identityId:
+ description: If multiple Managed Identity is assigned to the
+ pod, you can select the one to be used
+ type: string
+ serviceAccountRef:
+ description: |-
+ ServiceAccountRef specified the service account
+ that should be used when authenticating with WorkloadIdentity.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ tenantId:
+ description: TenantID configures the Azure Tenant to send
+ requests to. Required for ServicePrincipal auth type. Optional
+ for WorkloadIdentity.
+ type: string
+ useAzureSDK:
+ default: false
+ description: |-
+ UseAzureSDK enables the use of the new Azure SDK for Go (azcore-based) instead of the legacy go-autorest SDK.
+ This is experimental and may have behavioral differences. Defaults to false (legacy SDK).
+ type: boolean
+ vaultUrl:
+ description: Vault Url from which the secrets to be fetched
+ from.
+ type: string
+ required:
+ - vaultUrl
+ type: object
+ barbican:
+ description: Barbican configures this store to sync secrets using
+ the OpenStack Barbican provider
+ properties:
+ auth:
+ description: BarbicanAuth contains the authentication information
+ for Barbican.
+ properties:
+ password:
+ description: BarbicanProviderPasswordRef defines a reference
+ to a secret containing password for the Barbican provider.
+ properties:
+ secretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - secretRef
+ type: object
+ username:
+ description: BarbicanProviderUsernameRef defines a reference
+ to a secret containing username for the Barbican provider.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ secretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ type: string
+ type: object
+ required:
+ - password
+ - username
+ type: object
+ authURL:
+ type: string
+ domainName:
+ type: string
+ region:
+ type: string
+ tenantName:
+ type: string
+ required:
+ - auth
+ type: object
+ beyondtrust:
+ description: Beyondtrust configures this store to sync secrets
+ using Password Safe provider.
+ properties:
+ auth:
+ description: Auth configures how the operator authenticates
+ with Beyondtrust.
+ properties:
+ apiKey:
+ description: APIKey If not provided then ClientID/ClientSecret
+ become required.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret
+ that will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set
+ a value without using a secret.
+ type: string
+ type: object
+ certificate:
+ description: Certificate (cert.pem) for use when authenticating
+ with an OAuth client Id using a Client Certificate.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret
+ that will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set
+ a value without using a secret.
+ type: string
+ type: object
+ certificateKey:
+ description: Certificate private key (key.pem). For use
+ when authenticating with an OAuth client Id
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret
+ that will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set
+ a value without using a secret.
+ type: string
+ type: object
+ clientId:
+ description: ClientID is the API OAuth Client ID.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret
+ that will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set
+ a value without using a secret.
+ type: string
+ type: object
+ clientSecret:
+ description: ClientSecret is the API OAuth Client Secret.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret
+ that will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set
+ a value without using a secret.
+ type: string
+ type: object
+ type: object
+ server:
+ description: Auth configures how API server works.
+ properties:
+ apiUrl:
+ type: string
+ apiVersion:
+ type: string
+ clientTimeOutSeconds:
+ description: Timeout specifies a time limit for requests
+ made by this Client. The timeout includes connection
+ time, any redirects, and reading the response body.
+ Defaults to 45 seconds.
+ type: integer
+ decrypt:
+ default: true
+ description: 'When true, the response includes the decrypted
+ password. When false, the password field is omitted.
+ This option only applies to the SECRET retrieval type.
+ Default: true.'
+ type: boolean
+ retrievalType:
+ description: The secret retrieval type. SECRET = Secrets
+ Safe (credential, text, file). MANAGED_ACCOUNT = Password
+ Safe account associated with a system.
+ type: string
+ separator:
+ description: A character that separates the folder names.
+ type: string
+ verifyCA:
+ type: boolean
+ required:
+ - apiUrl
+ - verifyCA
+ type: object
+ required:
+ - auth
+ - server
+ type: object
+ bitwardensecretsmanager:
+ description: BitwardenSecretsManager configures this store to
+ sync secrets using BitwardenSecretsManager provider
+ properties:
+ apiURL:
+ type: string
+ auth:
+ description: |-
+ Auth configures how secret-manager authenticates with a bitwarden machine account instance.
+ Make sure that the token being used has permissions on the given secret.
+ properties:
+ secretRef:
+ description: BitwardenSecretsManagerSecretRef contains
+ the credential ref to the bitwarden instance.
+ properties:
+ credentials:
+ description: AccessToken used for the bitwarden instance.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - credentials
+ type: object
+ required:
+ - secretRef
+ type: object
+ bitwardenServerSDKURL:
+ type: string
+ caBundle:
+ description: |-
+ Base64 encoded certificate for the bitwarden server sdk. The sdk MUST run with HTTPS to make sure no MITM attack
+ can be performed.
+ type: string
+ caProvider:
+ description: 'see: https://external-secrets.io/latest/spec/#external-secrets.io/v1alpha1.CAProvider'
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ identityURL:
+ type: string
+ organizationID:
+ description: OrganizationID determines which organization
+ this secret store manages.
+ type: string
+ projectID:
+ description: ProjectID determines which project this secret
+ store manages.
+ type: string
+ required:
+ - auth
+ - organizationID
+ - projectID
+ type: object
+ chef:
+ description: Chef configures this store to sync secrets with chef
+ server
+ properties:
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against chef Server
+ properties:
+ secretRef:
+ description: ChefAuthSecretRef holds secret references
+ for chef server login credentials.
+ properties:
+ privateKeySecretRef:
+ description: SecretKey is the Signing Key in PEM format,
+ used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - privateKeySecretRef
+ type: object
+ required:
+ - secretRef
+ type: object
+ serverUrl:
+ description: ServerURL is the chef server URL used to connect
+ to. If using orgs you should include your org in the url
+ and terminate the url with a "/"
+ type: string
+ username:
+ description: UserName should be the user ID on the chef server
+ type: string
+ required:
+ - auth
+ - serverUrl
+ - username
+ type: object
+ cloudrusm:
+ description: CloudruSM configures this store to sync secrets using
+ the Cloud.ru Secret Manager provider
+ properties:
+ auth:
+ description: CSMAuth contains a secretRef for credentials.
+ properties:
+ secretRef:
+ description: CSMAuthSecretRef holds secret references
+ for Cloud.ru credentials.
+ properties:
+ accessKeyIDSecretRef:
+ description: The AccessKeyID is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ accessKeySecretSecretRef:
+ description: The AccessKeySecret is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - accessKeyIDSecretRef
+ - accessKeySecretSecretRef
+ type: object
+ type: object
+ projectID:
+ description: ProjectID is the project, which the secrets are
+ stored in.
+ type: string
+ required:
+ - auth
+ type: object
+ conjur:
+ description: Conjur configures this store to sync secrets using
+ conjur provider
+ properties:
+ auth:
+ description: Defines authentication settings for connecting
+ to Conjur.
+ properties:
+ apikey:
+ description: Authenticates with Conjur using an API key.
+ properties:
+ account:
+ description: Account is the Conjur organization account
+ name.
+ type: string
+ apiKeyRef:
+ description: |-
+ A reference to a specific 'key' containing the Conjur API key
+ within a Secret resource. In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ userRef:
+ description: |-
+ A reference to a specific 'key' containing the Conjur username
+ within a Secret resource. In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - account
+ - apiKeyRef
+ - userRef
+ type: object
+ jwt:
+ description: Jwt enables JWT authentication using Kubernetes
+ service account tokens.
+ properties:
+ account:
+ description: Account is the Conjur organization account
+ name.
+ type: string
+ hostId:
+ description: |-
+ Optional HostID for JWT authentication. This may be used depending
+ on how the Conjur JWT authenticator policy is configured.
+ type: string
+ secretRef:
+ description: |-
+ Optional SecretRef that refers to a key in a Secret resource containing JWT token to
+ authenticate with Conjur using the JWT authentication method.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ serviceAccountRef:
+ description: |-
+ Optional ServiceAccountRef specifies the Kubernetes service account for which to request
+ a token for with the `TokenRequest` API.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ serviceID:
+ description: The conjur authn jwt webservice id
+ type: string
+ required:
+ - account
+ - serviceID
+ type: object
+ type: object
+ caBundle:
+ description: CABundle is a PEM encoded CA bundle that will
+ be used to validate the Conjur server certificate.
+ type: string
+ caProvider:
+ description: |-
+ Used to provide custom certificate authority (CA) certificates
+ for a secret store. The CAProvider points to a Secret or ConfigMap resource
+ that contains a PEM-encoded certificate.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ url:
+ description: URL is the endpoint of the Conjur instance.
+ type: string
+ required:
+ - auth
+ - url
+ type: object
+ delinea:
+ description: |-
+ Delinea DevOps Secrets Vault
+ https://docs.delinea.com/online-help/products/devops-secrets-vault/current
+ properties:
+ clientId:
+ description: ClientID is the non-secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ clientSecret:
+ description: ClientSecret is the secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ tenant:
+ description: Tenant is the chosen hostname / site name.
+ type: string
+ tld:
+ description: |-
+ TLD is based on the server location that was chosen during provisioning.
+ If unset, defaults to "com".
+ type: string
+ urlTemplate:
+ description: |-
+ URLTemplate
+ If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
+ type: string
+ required:
+ - clientId
+ - clientSecret
+ - tenant
+ type: object
+ doppler:
+ description: Doppler configures this store to sync secrets using
+ the Doppler provider
+ properties:
+ auth:
+ description: Auth configures how the Operator authenticates
+ with the Doppler API
+ properties:
+ oidcConfig:
+ description: OIDCConfig authenticates using Kubernetes
+ ServiceAccount tokens via OIDC.
+ properties:
+ expirationSeconds:
+ default: 600
+ description: |-
+ ExpirationSeconds sets the ServiceAccount token validity duration.
+ Defaults to 10 minutes.
+ format: int64
+ type: integer
+ identity:
+ description: Identity is the Doppler Service Account
+ Identity ID configured for OIDC authentication.
+ type: string
+ serviceAccountRef:
+ description: ServiceAccountRef specifies the Kubernetes
+ ServiceAccount to use for authentication.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - identity
+ - serviceAccountRef
+ type: object
+ secretRef:
+ description: SecretRef authenticates using a Doppler service
+ token stored in a Kubernetes Secret.
+ properties:
+ dopplerToken:
+ description: |-
+ The DopplerToken is used for authentication.
+ See https://docs.doppler.com/reference/api#authentication for auth token types.
+ The Key attribute defaults to dopplerToken if not specified.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - dopplerToken
+ type: object
+ type: object
+ x-kubernetes-validations:
+ - message: Exactly one of 'secretRef' or 'oidcConfig' must
+ be specified
+ rule: (has(self.secretRef) && !has(self.oidcConfig)) ||
+ (!has(self.secretRef) && has(self.oidcConfig))
+ config:
+ description: Doppler config (required if not using a Service
+ Token)
+ type: string
+ format:
+ description: Format enables the downloading of secrets as
+ a file (string)
+ enum:
+ - json
+ - dotnet-json
+ - env
+ - yaml
+ - docker
+ type: string
+ nameTransformer:
+ description: Environment variable compatible name transforms
+ that change secret names to a different format
+ enum:
+ - upper-camel
+ - camel
+ - lower-snake
+ - tf-var
+ - dotnet-env
+ - lower-kebab
+ type: string
+ project:
+ description: Doppler project (required if not using a Service
+ Token)
+ type: string
+ required:
+ - auth
+ type: object
+ dvls:
+ description: DVLS configures this store to sync secrets using
+ Devolutions Server provider
+ properties:
+ auth:
+ description: Auth defines the authentication method to use.
+ properties:
+ secretRef:
+ description: SecretRef contains the Application ID and
+ Application Secret for authentication.
+ properties:
+ appId:
+ description: AppID is the reference to the secret
+ containing the Application ID.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ appSecret:
+ description: AppSecret is the reference to the secret
+ containing the Application Secret.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - appId
+ - appSecret
+ type: object
+ required:
+ - secretRef
+ type: object
+ insecure:
+ description: |-
+ Insecure allows connecting to DVLS over plain HTTP.
+ This is NOT RECOMMENDED for production use.
+ Set to true only if you understand the security implications.
+ type: boolean
+ serverUrl:
+ description: ServerURL is the DVLS instance URL (e.g., https://dvls.example.com).
+ type: string
+ required:
+ - auth
+ - serverUrl
+ type: object
+ fake:
+ description: Fake configures a store with static key/value pairs
+ properties:
+ data:
+ items:
+ description: FakeProviderData defines a key-value pair with
+ optional version for the fake provider.
+ properties:
+ key:
+ type: string
+ value:
+ type: string
+ version:
+ type: string
+ required:
+ - key
+ - value
+ type: object
+ type: array
+ validationResult:
+ description: ValidationResult is defined type for the number
+ of validation results.
+ type: integer
+ required:
+ - data
+ type: object
+ fortanix:
+ description: Fortanix configures this store to sync secrets using
+ the Fortanix provider
+ properties:
+ apiKey:
+ description: APIKey is the API token to access SDKMS Applications.
+ properties:
+ secretRef:
+ description: SecretRef is a reference to a secret containing
+ the SDKMS API Key.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ apiUrl:
+ description: APIURL is the URL of SDKMS API. Defaults to `sdkms.fortanix.com`.
+ type: string
+ type: object
+ gcpsm:
+ description: GCPSM configures this store to sync secrets using
+ Google Cloud Platform Secret Manager provider
+ properties:
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against GCP
+ properties:
+ secretRef:
+ description: GCPSMAuthSecretRef contains the secret references
+ for GCP Secret Manager authentication.
+ properties:
+ secretAccessKeySecretRef:
+ description: The SecretAccessKey is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ workloadIdentity:
+ description: GCPWorkloadIdentity defines configuration
+ for workload identity authentication to GCP.
+ properties:
+ clusterLocation:
+ description: |-
+ ClusterLocation is the location of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ clusterName:
+ description: |-
+ ClusterName is the name of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ clusterProjectID:
+ description: |-
+ ClusterProjectID is the project ID of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ serviceAccountRef:
+ description: ServiceAccountSelector is a reference
+ to a ServiceAccount resource.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - serviceAccountRef
+ type: object
+ workloadIdentityFederation:
+ description: GCPWorkloadIdentityFederation holds the configurations
+ required for generating federated access tokens.
+ properties:
+ audience:
+ description: |-
+ audience is the Secure Token Service (STS) audience which contains the resource name for the workload identity pool and the provider identifier in that pool.
+ If specified, Audience found in the external account credential config will be overridden with the configured value.
+ audience must be provided when serviceAccountRef or awsSecurityCredentials is configured.
+ type: string
+ awsSecurityCredentials:
+ description: |-
+ awsSecurityCredentials is for configuring AWS region and credentials to use for obtaining the access token,
+ when using the AWS metadata server is not an option.
+ properties:
+ awsCredentialsSecretRef:
+ description: |-
+ awsCredentialsSecretRef is the reference to the secret which holds the AWS credentials.
+ Secret should be created with below names for keys
+ - aws_access_key_id: Access Key ID, which is the unique identifier for the AWS account or the IAM user.
+ - aws_secret_access_key: Secret Access Key, which is used to authenticate requests made to AWS services.
+ - aws_session_token: Session Token, is the short-lived token to authenticate requests made to AWS services.
+ properties:
+ name:
+ description: name of the secret.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: namespace in which the secret
+ exists. If empty, secret will looked up
+ in local namespace.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ region:
+ description: region is for configuring the AWS
+ region to be used.
+ example: ap-south-1
+ maxLength: 50
+ minLength: 1
+ pattern: ^[a-z0-9-]+$
+ type: string
+ required:
+ - awsCredentialsSecretRef
+ - region
+ type: object
+ credConfig:
+ description: |-
+ credConfig holds the configmap reference containing the GCP external account credential configuration in JSON format and the key name containing the json data.
+ For using Kubernetes cluster as the identity provider, use serviceAccountRef instead. Operators mounted serviceaccount token cannot be used as the token source, instead
+ serviceAccountRef must be used by providing operators service account details.
+ properties:
+ key:
+ description: key name holding the external account
+ credential config.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: name of the configmap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: namespace in which the configmap
+ exists. If empty, configmap will looked up in
+ local namespace.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - key
+ - name
+ type: object
+ externalTokenEndpoint:
+ description: |-
+ externalTokenEndpoint is the endpoint explicitly set up to provide tokens, which will be matched against the
+ credential_source.url in the provided credConfig. This field is merely to double-check the external token source
+ URL is having the expected value.
+ type: string
+ serviceAccountRef:
+ description: |-
+ serviceAccountRef is the reference to the kubernetes ServiceAccount to be used for obtaining the tokens,
+ when Kubernetes is configured as provider in workload identity pool.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ type: object
+ type: object
+ location:
+ description: Location optionally defines a location for a
+ secret
+ type: string
+ projectID:
+ description: ProjectID project where secret is located
+ type: string
+ secretVersionSelectionPolicy:
+ default: LatestOrFail
+ description: |-
+ SecretVersionSelectionPolicy specifies how the provider selects a secret version
+ when "latest" is disabled or destroyed.
+ Possible values are:
+ - LatestOrFail: the provider always uses "latest", or fails if that version is disabled/destroyed.
+ - LatestOrFetch: the provider falls back to fetching the latest version if the version is DESTROYED or DISABLED
+ type: string
+ type: object
+ github:
+ description: |-
+ Github configures this store to push GitHub Actions secrets using the GitHub API provider.
+ Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub
+ properties:
+ appID:
+ description: appID specifies the Github APP that will be used
+ to authenticate the client
+ format: int64
+ type: integer
+ auth:
+ description: auth configures how secret-manager authenticates
+ with a Github instance.
+ properties:
+ privateKey:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - privateKey
+ type: object
+ environment:
+ description: environment will be used to fetch secrets from
+ a particular environment within a github repository
+ type: string
+ installationID:
+ description: installationID specifies the Github APP installation
+ that will be used to authenticate the client
+ format: int64
+ type: integer
+ organization:
+ description: organization will be used to fetch secrets from
+ the Github organization
+ type: string
+ repository:
+ description: repository will be used to fetch secrets from
+ the Github repository within an organization
+ type: string
+ uploadURL:
+ description: Upload URL for enterprise instances. Default
+ to URL.
+ type: string
+ url:
+ default: https://github.com/
+ description: URL configures the Github instance URL. Defaults
+ to https://github.com/.
+ type: string
+ required:
+ - appID
+ - auth
+ - installationID
+ - organization
+ type: object
+ gitlab:
+ description: GitLab configures this store to sync secrets using
+ GitLab Variables provider
+ properties:
+ auth:
+ description: Auth configures how secret-manager authenticates
+ with a GitLab instance.
+ properties:
+ SecretRef:
+ description: GitlabSecretRef contains the secret reference
+ for GitLab authentication credentials.
+ properties:
+ accessToken:
+ description: AccessToken is used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ required:
+ - SecretRef
+ type: object
+ caBundle:
+ description: |-
+ Base64 encoded certificate for the GitLab server sdk. The sdk MUST run with HTTPS to make sure no MITM attack
+ can be performed.
+ format: byte
+ type: string
+ caProvider:
+ description: 'see: https://external-secrets.io/latest/spec/#external-secrets.io/v1alpha1.CAProvider'
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ environment:
+ description: Environment environment_scope of gitlab CI/CD
+ variables (Please see https://docs.gitlab.com/ee/ci/environments/#create-a-static-environment
+ on how to create environments)
+ type: string
+ groupIDs:
+ description: GroupIDs specify, which gitlab groups to pull
+ secrets from. Group secrets are read from left to right
+ followed by the project variables.
+ items:
+ type: string
+ type: array
+ inheritFromGroups:
+ description: InheritFromGroups specifies whether parent groups
+ should be discovered and checked for secrets.
+ type: boolean
+ projectID:
+ description: ProjectID specifies a project where secrets are
+ located.
+ type: string
+ url:
+ description: URL configures the GitLab instance URL. Defaults
+ to https://gitlab.com/.
+ type: string
+ required:
+ - auth
+ type: object
+ ibm:
+ description: IBM configures this store to sync secrets using IBM
+ Cloud provider
+ properties:
+ auth:
+ description: Auth configures how secret-manager authenticates
+ with the IBM secrets manager.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ containerAuth:
+ description: IBMAuthContainerAuth defines container-based
+ authentication with IAM Trusted Profile.
+ properties:
+ iamEndpoint:
+ type: string
+ profile:
+ description: the IBM Trusted Profile
+ type: string
+ tokenLocation:
+ description: Location the token is mounted on the
+ pod
+ type: string
+ required:
+ - profile
+ type: object
+ secretRef:
+ description: IBMAuthSecretRef contains the secret reference
+ for IBM Cloud API key authentication.
+ properties:
+ iamEndpoint:
+ description: The IAM endpoint used to obain a token
+ type: string
+ secretApiKeySecretRef:
+ description: The SecretAccessKey is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ type: object
+ serviceUrl:
+ description: ServiceURL is the Endpoint URL that is specific
+ to the Secrets Manager service instance
+ type: string
+ required:
+ - auth
+ type: object
+ infisical:
+ description: Infisical configures this store to sync secrets using
+ the Infisical provider
+ properties:
+ auth:
+ description: Auth configures how the Operator authenticates
+ with the Infisical API
+ properties:
+ awsAuthCredentials:
+ description: AwsAuthCredentials represents the credentials
+ for AWS authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ type: object
+ azureAuthCredentials:
+ description: AzureAuthCredentials represents the credentials
+ for Azure authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ resource:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ type: object
+ gcpIamAuthCredentials:
+ description: GcpIamAuthCredentials represents the credentials
+ for GCP IAM authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ serviceAccountKeyFilePath:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ - serviceAccountKeyFilePath
+ type: object
+ gcpIdTokenAuthCredentials:
+ description: GcpIDTokenAuthCredentials represents the
+ credentials for GCP ID token authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ type: object
+ jwtAuthCredentials:
+ description: JwtAuthCredentials represents the credentials
+ for JWT authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ jwt:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ - jwt
+ type: object
+ kubernetesAuthCredentials:
+ description: KubernetesAuthCredentials represents the
+ credentials for Kubernetes authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ serviceAccountTokenPath:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ type: object
+ ldapAuthCredentials:
+ description: LdapAuthCredentials represents the credentials
+ for LDAP authentication.
+ properties:
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ ldapPassword:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ ldapUsername:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - identityId
+ - ldapPassword
+ - ldapUsername
+ type: object
+ ociAuthCredentials:
+ description: OciAuthCredentials represents the credentials
+ for OCI authentication.
+ properties:
+ fingerprint:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ identityId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ privateKey:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ privateKeyPassphrase:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ region:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ tenancyId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ userId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - fingerprint
+ - identityId
+ - privateKey
+ - region
+ - tenancyId
+ - userId
+ type: object
+ tokenAuthCredentials:
+ description: TokenAuthCredentials represents the credentials
+ for access token-based authentication.
+ properties:
+ accessToken:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - accessToken
+ type: object
+ universalAuthCredentials:
+ description: UniversalAuthCredentials represents the client
+ credentials for universal authentication.
+ properties:
+ clientId:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ clientSecret:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - clientId
+ - clientSecret
+ type: object
+ type: object
+ caBundle:
+ description: |-
+ CABundle is a PEM-encoded CA certificate bundle used to validate
+ the Infisical server's TLS certificate. Mutually exclusive with CAProvider.
+ format: byte
+ type: string
+ caProvider:
+ description: |-
+ CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate.
+ The certificate is used to validate the Infisical server's TLS certificate.
+ Mutually exclusive with CABundle.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ hostAPI:
+ default: https://app.infisical.com/api
+ description: HostAPI specifies the base URL of the Infisical
+ API. If not provided, it defaults to "https://app.infisical.com/api".
+ type: string
+ secretsScope:
+ description: SecretsScope defines the scope of the secrets
+ within the workspace
+ properties:
+ environmentSlug:
+ description: EnvironmentSlug is the required slug identifier
+ for the environment.
+ type: string
+ expandSecretReferences:
+ default: true
+ description: ExpandSecretReferences indicates whether
+ secret references should be expanded. Defaults to true
+ if not provided.
+ type: boolean
+ projectSlug:
+ description: ProjectSlug is the required slug identifier
+ for the project.
+ type: string
+ recursive:
+ default: false
+ description: Recursive indicates whether the secrets should
+ be fetched recursively. Defaults to false if not provided.
+ type: boolean
+ secretsPath:
+ default: /
+ description: SecretsPath specifies the path to the secrets
+ within the workspace. Defaults to "/" if not provided.
+ type: string
+ required:
+ - environmentSlug
+ - projectSlug
+ type: object
+ required:
+ - auth
+ - secretsScope
+ type: object
+ keepersecurity:
+ description: KeeperSecurity configures this store to sync secrets
+ using the KeeperSecurity provider
+ properties:
+ authRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being referred
+ to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ folderID:
+ type: string
+ required:
+ - authRef
+ - folderID
+ type: object
+ kubernetes:
+ description: Kubernetes configures this store to sync secrets
+ using a Kubernetes cluster provider
+ properties:
+ auth:
+ description: Auth configures how secret-manager authenticates
+ with a Kubernetes instance.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ cert:
+ description: has both clientCert and clientKey as secretKeySelector
+ properties:
+ clientCert:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ clientKey:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ serviceAccount:
+ description: points to a service account that should be
+ used for authentication
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ token:
+ description: use static token to authenticate with
+ properties:
+ bearerToken:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ type: object
+ authRef:
+ description: A reference to a secret that contains the auth
+ information.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being referred
+ to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ remoteNamespace:
+ default: default
+ description: Remote namespace to fetch the secrets from
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ server:
+ description: configures the Kubernetes server Address.
+ properties:
+ caBundle:
+ description: CABundle is a base64-encoded CA certificate
+ format: byte
+ type: string
+ caProvider:
+ description: 'see: https://external-secrets.io/v0.4.1/spec/#external-secrets.io/v1alpha1.CAProvider'
+ properties:
+ key:
+ description: The key where the CA certificate can
+ be found in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the
+ provider type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ url:
+ default: kubernetes.default
+ description: configures the Kubernetes server Address.
+ type: string
+ type: object
+ type: object
+ nebiusmysterybox:
+ description: NebiusMysterybox configures this store to sync secrets
+ using NebiusMysterybox provider
+ properties:
+ apiDomain:
+ description: NebiusMysterybox API endpoint
+ type: string
+ auth:
+ description: Auth defines parameters to authenticate in MysteryBox
+ properties:
+ serviceAccountCredsSecretRef:
+ description: |-
+ ServiceAccountCreds references a Kubernetes Secret key that contains a JSON
+ document with service account credentials used to get an IAM token.
+
+ Expected JSON structure:
+ {
+ "subject-credentials": {
+ "alg": "RS256",
+ "private-key": "-----BEGIN PRIVATE KEY-----\n\n-----END PRIVATE KEY-----\n",
+ "kid": "",
+ "iss": "",
+ "sub": ""
+ }
+ }
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ tokenSecretRef:
+ description: Token authenticates with Nebius Mysterybox
+ by presenting a token.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ x-kubernetes-validations:
+ - message: either serviceAccountCredsSecretRef or tokenSecretRef
+ must be set
+ rule: has(self.serviceAccountCredsSecretRef) || has(self.tokenSecretRef)
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ NebiusMysterybox server certificate.
+ properties:
+ certSecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ required:
+ - apiDomain
+ - auth
+ type: object
+ ngrok:
+ description: Ngrok configures this store to sync secrets using
+ the ngrok provider.
+ properties:
+ apiUrl:
+ default: https://api.ngrok.com
+ description: APIURL is the URL of the ngrok API.
+ type: string
+ auth:
+ description: Auth configures how the ngrok provider authenticates
+ with the ngrok API.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ apiKey:
+ description: APIKey is the API Key used to authenticate
+ with ngrok. See https://ngrok.com/docs/api/#authentication
+ properties:
+ secretRef:
+ description: SecretRef is a reference to a secret
+ containing the ngrok API key.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ type: object
+ vault:
+ description: Vault configures the ngrok vault to sync secrets
+ with.
+ properties:
+ name:
+ description: Name is the name of the ngrok vault to sync
+ secrets with.
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - auth
+ - vault
+ type: object
+ onboardbase:
+ description: Onboardbase configures this store to sync secrets
+ using the Onboardbase provider
+ properties:
+ apiHost:
+ default: https://public.onboardbase.com/api/v1/
+ description: APIHost use this to configure the host url for
+ the API for selfhosted installation, default is https://public.onboardbase.com/api/v1/
+ type: string
+ auth:
+ description: Auth configures how the Operator authenticates
+ with the Onboardbase API
+ properties:
+ apiKeyRef:
+ description: |-
+ OnboardbaseAPIKey is the APIKey generated by an admin account.
+ It is used to recognize and authorize access to a project and environment within onboardbase
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ passcodeRef:
+ description: OnboardbasePasscode is the passcode attached
+ to the API Key
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - apiKeyRef
+ - passcodeRef
+ type: object
+ environment:
+ default: development
+ description: Environment is the name of an environmnent within
+ a project to pull the secrets from
+ type: string
+ project:
+ default: development
+ description: Project is an onboardbase project that the secrets
+ should be pulled from
+ type: string
+ required:
+ - apiHost
+ - auth
+ - environment
+ - project
+ type: object
+ onepassword:
+ description: OnePassword configures this store to sync secrets
+ using the 1Password Cloud provider
+ properties:
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against OnePassword Connect Server
+ properties:
+ secretRef:
+ description: OnePasswordAuthSecretRef holds secret references
+ for 1Password credentials.
+ properties:
+ connectTokenSecretRef:
+ description: The ConnectToken is used for authentication
+ to a 1Password Connect Server.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - connectTokenSecretRef
+ type: object
+ required:
+ - secretRef
+ type: object
+ connectHost:
+ description: ConnectHost defines the OnePassword Connect Server
+ to connect to
+ type: string
+ vaults:
+ additionalProperties:
+ type: integer
+ description: Vaults defines which OnePassword vaults to search
+ in which order
+ type: object
+ required:
+ - auth
+ - connectHost
+ - vaults
+ type: object
+ onepasswordSDK:
+ description: OnePasswordSDK configures this store to use 1Password's
+ new Go SDK to sync secrets.
+ properties:
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against OnePassword API.
+ properties:
+ serviceAccountSecretRef:
+ description: ServiceAccountSecretRef points to the secret
+ containing the token to access 1Password vault.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - serviceAccountSecretRef
+ type: object
+ cache:
+ description: |-
+ Cache configures client-side caching for read operations (GetSecret, GetSecretMap).
+ When enabled, secrets are cached with the specified TTL.
+ Write operations (PushSecret, DeleteSecret) automatically invalidate relevant cache entries.
+ If omitted, caching is disabled (default).
+ cache: {} is a valid option to set.
+ properties:
+ maxSize:
+ default: 100
+ description: |-
+ MaxSize is the maximum number of secrets to cache.
+ When the cache is full, least-recently-used entries are evicted.
+ minimum: 1
+ type: integer
+ ttl:
+ default: 5m
+ description: |-
+ TTL is the time-to-live for cached secrets.
+ Format: duration string (e.g., "5m", "1h", "30s")
+ type: string
+ type: object
+ integrationInfo:
+ description: |-
+ IntegrationInfo specifies the name and version of the integration built using the 1Password Go SDK.
+ If you don't know which name and version to use, use `DefaultIntegrationName` and `DefaultIntegrationVersion`, respectively.
+ properties:
+ name:
+ default: 1Password SDK
+ description: Name defaults to "1Password SDK".
+ type: string
+ version:
+ default: v1.0.0
+ description: Version defaults to "v1.0.0".
+ type: string
+ type: object
+ vault:
+ description: Vault defines the vault's name or uuid to access.
+ Do NOT add op:// prefix. This will be done automatically.
+ type: string
+ required:
+ - auth
+ - vault
+ type: object
+ oracle:
+ description: Oracle configures this store to sync secrets using
+ Oracle Vault provider
+ properties:
+ auth:
+ description: |-
+ Auth configures how secret-manager authenticates with the Oracle Vault.
+ If empty, use the instance principal, otherwise the user credentials specified in Auth.
+ properties:
+ secretRef:
+ description: SecretRef to pass through sensitive information.
+ properties:
+ fingerprint:
+ description: Fingerprint is the fingerprint of the
+ API private key.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ privatekey:
+ description: PrivateKey is the user's API Signing
+ Key in PEM format, used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - fingerprint
+ - privatekey
+ type: object
+ tenancy:
+ description: Tenancy is the tenancy OCID where user is
+ located.
+ type: string
+ user:
+ description: User is an access OCID specific to the account.
+ type: string
+ required:
+ - secretRef
+ - tenancy
+ - user
+ type: object
+ compartment:
+ description: |-
+ Compartment is the vault compartment OCID.
+ Required for PushSecret
+ type: string
+ encryptionKey:
+ description: |-
+ EncryptionKey is the OCID of the encryption key within the vault.
+ Required for PushSecret
+ type: string
+ principalType:
+ description: |-
+ The type of principal to use for authentication. If left blank, the Auth struct will
+ determine the principal type. This optional field must be specified if using
+ workload identity.
+ enum:
+ - ""
+ - UserPrincipal
+ - InstancePrincipal
+ - Workload
+ type: string
+ region:
+ description: Region is the region where vault is located.
+ type: string
+ serviceAccountRef:
+ description: |-
+ ServiceAccountRef specified the service account
+ that should be used when authenticating with WorkloadIdentity.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ vault:
+ description: Vault is the vault's OCID of the specific vault
+ where secret is located.
+ type: string
+ required:
+ - region
+ - vault
+ type: object
+ passbolt:
+ description: |-
+ PassboltProvider provides access to Passbolt secrets manager.
+ See: https://www.passbolt.com.
+ properties:
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against Passbolt Server
+ properties:
+ passwordSecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ privateKeySecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - passwordSecretRef
+ - privateKeySecretRef
+ type: object
+ host:
+ description: Host defines the Passbolt Server to connect to
+ type: string
+ required:
+ - auth
+ - host
+ type: object
+ passworddepot:
+ description: PasswordDepotProvider configures a store to sync
+ secrets with a Password Depot instance.
+ properties:
+ auth:
+ description: Auth configures how secret-manager authenticates
+ with a Password Depot instance.
+ properties:
+ secretRef:
+ description: PasswordDepotSecretRef contains the secret
+ reference for Password Depot authentication.
+ properties:
+ credentials:
+ description: Username / Password is used for authentication.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ required:
+ - secretRef
+ type: object
+ database:
+ description: Database to use as source
+ type: string
+ host:
+ description: URL configures the Password Depot instance URL.
+ type: string
+ required:
+ - auth
+ - database
+ - host
+ type: object
+ previder:
+ description: Previder configures this store to sync secrets using
+ the Previder provider
+ properties:
+ auth:
+ description: PreviderAuth contains a secretRef for credentials.
+ properties:
+ secretRef:
+ description: PreviderAuthSecretRef holds secret references
+ for Previder Vault credentials.
+ properties:
+ accessToken:
+ description: The AccessToken is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - accessToken
+ type: object
+ type: object
+ baseUri:
+ type: string
+ required:
+ - auth
+ type: object
+ pulumi:
+ description: Pulumi configures this store to sync secrets using
+ the Pulumi provider
+ properties:
+ accessToken:
+ description: AccessToken is the access tokens to sign in to
+ the Pulumi Cloud Console.
+ properties:
+ secretRef:
+ description: SecretRef is a reference to a secret containing
+ the Pulumi API token.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ apiUrl:
+ default: https://api.pulumi.com/api/esc
+ description: APIURL is the URL of the Pulumi API.
+ type: string
+ environment:
+ description: |-
+ Environment are YAML documents composed of static key-value pairs, programmatic expressions,
+ dynamically retrieved values from supported providers including all major clouds,
+ and other Pulumi ESC environments.
+ To create a new environment, visit https://www.pulumi.com/docs/esc/environments/ for more information.
+ type: string
+ organization:
+ description: |-
+ Organization are a space to collaborate on shared projects and stacks.
+ To create a new organization, visit https://app.pulumi.com/ and click "New Organization".
+ type: string
+ project:
+ description: Project is the name of the Pulumi ESC project
+ the environment belongs to.
+ type: string
+ required:
+ - accessToken
+ - environment
+ - organization
+ - project
+ type: object
+ scaleway:
+ description: Scaleway configures this store to sync secrets using
+ the Scaleway provider.
+ properties:
+ accessKey:
+ description: AccessKey is the non-secret part of the api key.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ apiUrl:
+ description: APIURL is the url of the api to use. Defaults
+ to https://api.scaleway.com
+ type: string
+ projectId:
+ description: 'ProjectID is the id of your project, which you
+ can find in the console: https://console.scaleway.com/project/settings'
+ type: string
+ region:
+ description: 'Region where your secrets are located: https://developers.scaleway.com/en/quickstart/#region-and-zone'
+ type: string
+ secretKey:
+ description: SecretKey is the non-secret part of the api key.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ required:
+ - accessKey
+ - projectId
+ - region
+ - secretKey
+ type: object
+ secretserver:
+ description: |-
+ SecretServer configures this store to sync secrets using SecretServer provider
+ https://docs.delinea.com/online-help/secret-server/start.htm
+ properties:
+ caBundle:
+ description: |-
+ PEM/base64 encoded CA bundle used to validate Secret ServerURL. Only used
+ if the ServerURL URL is using HTTPS protocol. If not set the system root certificates
+ are used to validate the TLS connection.
+ format: byte
+ type: string
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ Secret ServerURL certificate.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ domain:
+ description: Domain is the secret server domain.
+ type: string
+ password:
+ description: Password is the secret server account password.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ serverURL:
+ description: |-
+ ServerURL
+ URL to your secret server installation
+ type: string
+ username:
+ description: Username is the secret server account username.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ required:
+ - password
+ - serverURL
+ - username
+ type: object
+ senhasegura:
+ description: Senhasegura configures this store to sync secrets
+ using senhasegura provider
+ properties:
+ auth:
+ description: Auth defines parameters to authenticate in senhasegura
+ properties:
+ clientId:
+ type: string
+ clientSecretSecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - clientId
+ - clientSecretSecretRef
+ type: object
+ ignoreSslCertificate:
+ default: false
+ description: IgnoreSslCertificate defines if SSL certificate
+ must be ignored
+ type: boolean
+ module:
+ description: Module defines which senhasegura module should
+ be used to get secrets
+ type: string
+ url:
+ description: URL of senhasegura
+ type: string
+ required:
+ - auth
+ - module
+ - url
+ type: object
+ upboundspaces:
+ description: Upboundspaces configures this store to sync secrets
+ using Upbound Spaces provider
+ properties:
+ storeRef:
+ description: StoreRef holds ref to Upbound Spaces secret store
+ properties:
+ name:
+ description: Name of the secret store on Upbound Spaces
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - storeRef
+ type: object
+ vault:
+ description: Vault configures this store to sync secrets using
+ the HashiCorp Vault provider.
+ properties:
+ auth:
+ description: Auth configures how secret-manager authenticates
+ with the Vault server.
+ properties:
+ appRole:
+ description: |-
+ AppRole authenticates with Vault using the App Role auth mechanism,
+ with the role and secret stored in a Kubernetes Secret resource.
+ properties:
+ path:
+ default: approle
+ description: |-
+ Path where the App Role authentication backend is mounted
+ in Vault, e.g: "approle"
+ type: string
+ roleId:
+ description: |-
+ RoleID configured in the App Role authentication backend when setting
+ up the authentication backend in Vault.
+ type: string
+ roleRef:
+ description: |-
+ Reference to a key in a Secret that contains the App Role ID used
+ to authenticate with Vault.
+ The `key` field must be specified and denotes which entry within the Secret
+ resource is used as the app role id.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ secretRef:
+ description: |-
+ Reference to a key in a Secret that contains the App Role secret used
+ to authenticate with Vault.
+ The `key` field must be specified and denotes which entry within the Secret
+ resource is used as the app role secret.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - path
+ - secretRef
+ type: object
+ cert:
+ description: |-
+ Cert authenticates with TLS Certificates by passing client certificate, private key and ca certificate
+ Cert authentication method
+ properties:
+ clientCert:
+ description: |-
+ ClientCert is a certificate to authenticate using the Cert Vault
+ authentication method
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ path:
+ default: cert
+ description: |-
+ Path where the Certificate authentication backend is mounted
+ in Vault, e.g: "cert"
+ type: string
+ secretRef:
+ description: |-
+ SecretRef to a key in a Secret resource containing client private key to
+ authenticate with Vault using the Cert authentication method
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ gcp:
+ description: |-
+ Gcp authenticates with Vault using Google Cloud Platform authentication method
+ GCP authentication method
+ properties:
+ location:
+ description: Location optionally defines a location/region
+ for the secret
+ type: string
+ path:
+ default: gcp
+ description: 'Path where the GCP auth method is enabled
+ in Vault, e.g: "gcp"'
+ type: string
+ projectID:
+ description: Project ID of the Google Cloud Platform
+ project
+ type: string
+ role:
+ description: Vault Role. In Vault, a role describes
+ an identity with a set of permissions, groups, or
+ policies you want to attach to a user of the secrets
+ engine.
+ type: string
+ secretRef:
+ description: Specify credentials in a Secret object
+ properties:
+ secretAccessKeySecretRef:
+ description: The SecretAccessKey is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ serviceAccountRef:
+ description: ServiceAccountRef to a service account
+ for impersonation
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ workloadIdentity:
+ description: Specify a service account with Workload
+ Identity
+ properties:
+ clusterLocation:
+ description: |-
+ ClusterLocation is the location of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ clusterName:
+ description: |-
+ ClusterName is the name of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ clusterProjectID:
+ description: |-
+ ClusterProjectID is the project ID of the cluster
+ If not specified, it fetches information from the metadata server
+ type: string
+ serviceAccountRef:
+ description: ServiceAccountSelector is a reference
+ to a ServiceAccount resource.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount
+ resource being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - serviceAccountRef
+ type: object
+ required:
+ - role
+ type: object
+ iam:
+ description: |-
+ Iam authenticates with vault by passing a special AWS request signed with AWS IAM credentials
+ AWS IAM authentication method
+ properties:
+ externalID:
+ description: AWS External ID set on assumed IAM roles
+ type: string
+ jwt:
+ description: Specify a service account with IRSA enabled
+ properties:
+ serviceAccountRef:
+ description: ServiceAccountSelector is a reference
+ to a ServiceAccount resource.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount
+ resource being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ type: object
+ path:
+ description: 'Path where the AWS auth method is enabled
+ in Vault, e.g: "aws"'
+ type: string
+ region:
+ description: AWS region
+ type: string
+ role:
+ description: This is the AWS role to be assumed before
+ talking to vault
+ type: string
+ secretRef:
+ description: Specify credentials in a Secret object
+ properties:
+ accessKeyIDSecretRef:
+ description: The AccessKeyID is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ secretAccessKeySecretRef:
+ description: The SecretAccessKey is used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ sessionTokenSecretRef:
+ description: |-
+ The SessionToken used for authentication
+ This must be defined if AccessKeyID and SecretAccessKey are temporary credentials
+ see: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_use-resources.html
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ vaultAwsIamServerID:
+ description: 'X-Vault-AWS-IAM-Server-ID is an additional
+ header used by Vault IAM auth method to mitigate
+ against different types of replay attacks. More
+ details here: https://developer.hashicorp.com/vault/docs/auth/aws'
+ type: string
+ vaultRole:
+ description: Vault Role. In vault, a role describes
+ an identity with a set of permissions, groups, or
+ policies you want to attach a user of the secrets
+ engine
+ type: string
+ required:
+ - vaultRole
+ type: object
+ jwt:
+ description: |-
+ Jwt authenticates with Vault by passing role and JWT token using the
+ JWT/OIDC authentication method
+ properties:
+ kubernetesServiceAccountToken:
+ description: |-
+ Optional ServiceAccountToken specifies the Kubernetes service account for which to request
+ a token for with the `TokenRequest` API.
+ properties:
+ audiences:
+ description: |-
+ Optional audiences field that will be used to request a temporary Kubernetes service
+ account token for the service account referenced by `serviceAccountRef`.
+ Defaults to a single audience `vault` it not specified.
+
+ Deprecated: use serviceAccountRef.Audiences instead
+ items:
+ type: string
+ type: array
+ expirationSeconds:
+ description: |-
+ Optional expiration time in seconds that will be used to request a temporary
+ Kubernetes service account token for the service account referenced by
+ `serviceAccountRef`.
+
+ Deprecated: this will be removed in the future.
+ Defaults to 10 minutes.
+ format: int64
+ type: integer
+ serviceAccountRef:
+ description: Service account field containing
+ the name of a kubernetes ServiceAccount.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount
+ resource being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - serviceAccountRef
+ type: object
+ path:
+ default: jwt
+ description: |-
+ Path where the JWT authentication backend is mounted
+ in Vault, e.g: "jwt"
+ type: string
+ role:
+ description: |-
+ Role is a JWT role to authenticate using the JWT/OIDC Vault
+ authentication method
+ type: string
+ secretRef:
+ description: |-
+ Optional SecretRef that refers to a key in a Secret resource containing JWT token to
+ authenticate with Vault using the JWT/OIDC authentication method.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - path
+ type: object
+ kubernetes:
+ description: |-
+ Kubernetes authenticates with Vault by passing the ServiceAccount
+ token stored in the named Secret resource to the Vault server.
+ properties:
+ mountPath:
+ default: kubernetes
+ description: |-
+ Path where the Kubernetes authentication backend is mounted in Vault, e.g:
+ "kubernetes"
+ type: string
+ role:
+ description: |-
+ A required field containing the Vault Role to assume. A Role binds a
+ Kubernetes ServiceAccount with a set of Vault policies.
+ type: string
+ secretRef:
+ description: |-
+ Optional secret field containing a Kubernetes ServiceAccount JWT used
+ for authenticating with Vault. If a name is specified without a key,
+ `token` is the default. If one is not specified, the one bound to
+ the controller will be used.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ serviceAccountRef:
+ description: |-
+ Optional service account field containing the name of a kubernetes ServiceAccount.
+ If the service account is specified, the service account secret token JWT will be used
+ for authenticating with Vault. If the service account selector is not supplied,
+ the secretRef will be used instead.
+ properties:
+ audiences:
+ description: |-
+ Audience specifies the `aud` claim for the service account token
+ If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
+ then this audiences will be appended to the list
+ items:
+ type: string
+ type: array
+ name:
+ description: The name of the ServiceAccount resource
+ being referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ Namespace of the resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ required:
+ - name
+ type: object
+ required:
+ - mountPath
+ - role
+ type: object
+ ldap:
+ description: |-
+ Ldap authenticates with Vault by passing username/password pair using
+ the LDAP authentication method
+ properties:
+ path:
+ default: ldap
+ description: |-
+ Path where the LDAP authentication backend is mounted
+ in Vault, e.g: "ldap"
+ type: string
+ secretRef:
+ description: |-
+ SecretRef to a key in a Secret resource containing password for the LDAP
+ user used to authenticate with Vault using the LDAP authentication
+ method
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ username:
+ description: |-
+ Username is an LDAP username used to authenticate using the LDAP Vault
+ authentication method
+ type: string
+ required:
+ - path
+ - username
+ type: object
+ namespace:
+ description: |-
+ Name of the vault namespace to authenticate to. This can be different than the namespace your secret is in.
+ Namespaces is a set of features within Vault Enterprise that allows
+ Vault environments to support Secure Multi-tenancy. e.g: "ns1".
+ More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces
+ This will default to Vault.Namespace field if set, or empty otherwise
+ type: string
+ tokenSecretRef:
+ description: TokenSecretRef authenticates with Vault by
+ presenting a token.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ userPass:
+ description: UserPass authenticates with Vault by passing
+ username/password pair
+ properties:
+ path:
+ default: userpass
+ description: |-
+ Path where the UserPassword authentication backend is mounted
+ in Vault, e.g: "userpass"
+ type: string
+ secretRef:
+ description: |-
+ SecretRef to a key in a Secret resource containing password for the
+ user used to authenticate with Vault using the UserPass authentication
+ method
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ username:
+ description: |-
+ Username is a username used to authenticate using the UserPass Vault
+ authentication method
+ type: string
+ required:
+ - path
+ - username
+ type: object
+ type: object
+ caBundle:
+ description: |-
+ PEM encoded CA bundle used to validate Vault server certificate. Only used
+ if the Server URL is using HTTPS protocol. This parameter is ignored for
+ plain HTTP protocol connection. If not set the system root certificates
+ are used to validate the TLS connection.
+ format: byte
+ type: string
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ Vault server certificate.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace the Provider type is in.
+ Can only be defined when used in a ClusterSecretStore.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ checkAndSet:
+ description: |-
+ CheckAndSet defines the Check-And-Set (CAS) settings for PushSecret operations.
+ Only applies to Vault KV v2 stores. When enabled, write operations must include
+ the current version of the secret to prevent unintentional overwrites.
+ properties:
+ required:
+ description: |-
+ Required when true, all write operations must include a check-and-set parameter.
+ This helps prevent unintentional overwrites of secrets.
+ type: boolean
+ type: object
+ forwardInconsistent:
+ description: |-
+ ForwardInconsistent tells Vault to forward read-after-write requests to the Vault
+ leader instead of simply retrying within a loop. This can increase performance if
+ the option is enabled serverside.
+ https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
+ type: boolean
+ headers:
+ additionalProperties:
+ type: string
+ description: Headers to be added in Vault request
+ type: object
+ namespace:
+ description: |-
+ Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
+ Vault environments to support Secure Multi-tenancy. e.g: "ns1".
+ More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces
+ type: string
+ path:
+ description: |-
+ Path is the mount path of the Vault KV backend endpoint, e.g:
+ "secret". The v2 KV secret engine version specific "/data" path suffix
+ for fetching secrets from Vault is optional and will be appended
+ if not present in specified path.
+ type: string
+ readYourWrites:
+ description: |-
+ ReadYourWrites ensures isolated read-after-write semantics by
+ providing discovered cluster replication states in each request.
+ More information about eventual consistency in Vault can be found here
+ https://www.vaultproject.io/docs/enterprise/consistency
+ type: boolean
+ server:
+ description: 'Server is the connection address for the Vault
+ server, e.g: "https://vault.example.com:8200".'
+ type: string
+ tls:
+ description: |-
+ The configuration used for client side related TLS communication, when the Vault server
+ requires mutual authentication. Only used if the Server URL is using HTTPS protocol.
+ This parameter is ignored for plain HTTP protocol connection.
+ It's worth noting this configuration is different from the "TLS certificates auth method",
+ which is available under the `auth.cert` section.
+ properties:
+ certSecretRef:
+ description: |-
+ CertSecretRef is a certificate added to the transport layer
+ when communicating with the Vault server.
+ If no key for the Secret is specified, external-secret will default to 'tls.crt'.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ keySecretRef:
+ description: |-
+ KeySecretRef to a key in a Secret resource containing client private key
+ added to the transport layer when communicating with the Vault server.
+ If no key for the Secret is specified, external-secret will default to 'tls.key'.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ version:
+ default: v2
+ description: |-
+ Version is the Vault KV secret engine version. This can be either "v1" or
+ "v2". Version defaults to "v2".
+ enum:
+ - v1
+ - v2
+ type: string
+ required:
+ - server
+ type: object
+ volcengine:
+ description: Volcengine configures this store to sync secrets
+ using the Volcengine provider
+ properties:
+ auth:
+ description: |-
+ Auth defines the authentication method to use.
+ If not specified, the provider will try to use IRSA (IAM Role for Service Account).
+ properties:
+ secretRef:
+ description: |-
+ SecretRef defines the static credentials to use for authentication.
+ If not set, IRSA is used.
+ properties:
+ accessKeyID:
+ description: AccessKeyID is the reference to the secret
+ containing the Access Key ID.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ secretAccessKey:
+ description: SecretAccessKey is the reference to the
+ secret containing the Secret Access Key.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ token:
+ description: Token is the reference to the secret
+ containing the STS(Security Token Service) Token.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - accessKeyID
+ - secretAccessKey
+ type: object
+ type: object
+ region:
+ description: Region specifies the Volcengine region to connect
+ to.
+ type: string
+ required:
+ - region
+ type: object
+ webhook:
+ description: Webhook configures this store to sync secrets using
+ a generic templated webhook
+ properties:
+ auth:
+ description: Auth specifies a authorization protocol. Only
+ one protocol may be set.
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ ntlm:
+ description: NTLMProtocol configures the store to use
+ NTLM for auth
+ properties:
+ passwordSecret:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ usernameSecret:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - passwordSecret
+ - usernameSecret
+ type: object
+ type: object
+ body:
+ description: Body
+ type: string
+ caBundle:
+ description: |-
+ PEM encoded CA bundle used to validate webhook server certificate. Only used
+ if the Server URL is using HTTPS protocol. This parameter is ignored for
+ plain HTTP protocol connection. If not set the system root certificates
+ are used to validate the TLS connection.
+ format: byte
+ type: string
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ webhook server certificate.
+ properties:
+ key:
+ description: The key where the CA certificate can be found
+ in the Secret or ConfigMap.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the object located at the provider
+ type.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: The namespace the Provider type is in.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type:
+ description: The type of provider to use such as "Secret",
+ or "ConfigMap".
+ enum:
+ - Secret
+ - ConfigMap
+ type: string
+ required:
+ - name
+ - type
+ type: object
+ headers:
+ additionalProperties:
+ type: string
+ description: Headers
+ type: object
+ method:
+ description: Webhook Method
+ type: string
+ result:
+ description: Result formatting
+ properties:
+ jsonPath:
+ description: Json path of return value
+ type: string
+ type: object
+ secrets:
+ description: |-
+ Secrets to fill in templates
+ These secrets will be passed to the templating function as key value pairs under the given name
+ items:
+ description: WebhookSecret defines a secret that will be
+ passed to the webhook request.
+ properties:
+ name:
+ description: Name of this secret in templates
+ type: string
+ secretRef:
+ description: Secret ref to fill in credentials
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ required:
+ - name
+ - secretRef
+ type: object
+ type: array
+ timeout:
+ description: Timeout
+ type: string
+ url:
+ description: Webhook url to call
+ type: string
+ required:
+ - url
+ type: object
+ yandexcertificatemanager:
+ description: YandexCertificateManager configures this store to
+ sync secrets using Yandex Certificate Manager provider
+ properties:
+ apiEndpoint:
+ description: Yandex.Cloud API endpoint (e.g. 'api.cloud.yandex.net:443')
+ type: string
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against Yandex.Cloud
+ properties:
+ authorizedKeySecretRef:
+ description: The authorized key used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ Yandex.Cloud server certificate.
+ properties:
+ certSecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ fetching:
+ description: FetchingPolicy configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as certificate ID or certificate name
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ byID:
+ description: ByID configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as secret ID.
+ type: object
+ byName:
+ description: ByName configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as secret name.
+ properties:
+ folderID:
+ description: The folder to fetch secrets from
+ type: string
+ required:
+ - folderID
+ type: object
+ type: object
+ required:
+ - auth
+ type: object
+ yandexlockbox:
+ description: YandexLockbox configures this store to sync secrets
+ using Yandex Lockbox provider
+ properties:
+ apiEndpoint:
+ description: Yandex.Cloud API endpoint (e.g. 'api.cloud.yandex.net:443')
+ type: string
+ auth:
+ description: Auth defines the information necessary to authenticate
+ against Yandex.Cloud
+ properties:
+ authorizedKeySecretRef:
+ description: The authorized key used for authentication
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ caProvider:
+ description: The provider for the CA bundle to use to validate
+ Yandex.Cloud server certificate.
+ properties:
+ certSecretRef:
+ description: |-
+ SecretKeySelector is a reference to a specific 'key' within a Secret resource.
+ In some instances, `key` is a required field.
+ properties:
+ key:
+ description: |-
+ A key in the referenced Secret.
+ Some instances of this field may be defaulted, in others it may be required.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[-._a-zA-Z0-9]+$
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ maxLength: 253
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
+ type: string
+ namespace:
+ description: |-
+ The namespace of the Secret resource being referred to.
+ Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
+ maxLength: 63
+ minLength: 1
+ pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
+ type: string
+ type: object
+ type: object
+ fetching:
+ description: FetchingPolicy configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as secret ID or secret name
+ maxProperties: 1
+ minProperties: 1
+ properties:
+ byID:
+ description: ByID configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as secret ID.
+ type: object
+ byName:
+ description: ByName configures the provider to interpret
+ the `data.secretKey.remoteRef.key` field in ExternalSecret
+ as secret name.
+ properties:
+ folderID:
+ description: The folder to fetch secrets from
+ type: string
+ required:
+ - folderID
+ type: object
+ type: object
+ required:
+ - auth
+ type: object
+ type: object
+ refreshInterval:
+ description: Used to configure store refresh interval in seconds.
+ type: integer
+ retrySettings:
+ description: Used to configure http retries if failed.
+ properties:
+ maxRetries:
+ format: int32
+ type: integer
+ retryInterval:
+ type: string
+ type: object
+ secretStoreMetadata:
+ description: The metadata of the secret store to be created.
+ properties:
+ annotations:
+ additionalProperties:
+ type: string
+ description: Annotations that are set on projected resource.
+ type: object
+ labels:
+ additionalProperties:
+ type: string
+ description: Labels that are set on projected resource.
+ type: object
+ type: object
+ secretStoreName:
+ description: |-
+ SecretStoreName is the name to use when creating secret stores within a control plane.
+ optional, if not set, SharedSecretStore name will be used.
+ When set, it is immutable.
+ maxLength: 253
+ minLength: 1
+ type: string
+ x-kubernetes-validations:
+ - message: value is immutable
+ rule: self == oldSelf
+ required:
+ - controlPlaneSelector
+ - namespaceSelector
+ - provider
+ type: object
+ x-kubernetes-validations:
+ - message: secretStoreName is immutable
+ rule: has(self.secretStoreName) == has(oldSelf.secretStoreName)
+ status:
+ description: SharedSecretStoreStatus defines the observed state of the
+ SecretStore.
+ properties:
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ failed:
+ description: List of provisioning failures.
+ items:
+ description: SecretStoreProvisioningFailure defines secret store
+ provisioning failure.
+ properties:
+ conditions:
+ description: List of occurred conditions.
+ items:
+ description: SecretStoreStatusCondition contains condition
+ information for a SecretStore.
+ properties:
+ lastTransitionTime:
+ format: date-time
+ type: string
+ message:
+ type: string
+ reason:
+ type: string
+ status:
+ type: string
+ type:
+ description: SecretStoreConditionType represents the condition
+ of the SecretStore.
+ type: string
+ required:
+ - status
+ - type
+ type: object
+ type: array
+ controlPlane:
+ description: ControlPlane name where the failure occurred.
+ type: string
+ required:
+ - controlPlane
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - controlPlane
+ x-kubernetes-list-type: map
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ provisioned:
+ description: List of successfully provisioned targets.
+ items:
+ description: SecretStoreProvisioningSuccess defines secret store
+ provision success.
+ properties:
+ controlPlane:
+ description: ControlPlane name where the secret store got projected
+ type: string
+ required:
+ - controlPlane
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - controlPlane
+ x-kubernetes-list-type: map
+ type: object
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}
diff --git a/static/crds/space/v1.17/spaces.upbound.io_simulations.yaml b/static/crds/space/v1.17/spaces.upbound.io_simulations.yaml
new file mode 100644
index 00000000..d9bf5737
--- /dev/null
+++ b/static/crds/space/v1.17/spaces.upbound.io_simulations.yaml
@@ -0,0 +1,243 @@
+---
+apiVersion: apiextensions.k8s.io/v1
+kind: CustomResourceDefinition
+metadata:
+ annotations:
+ controller-gen.kubebuilder.io/version: v0.20.1
+ name: simulations.spaces.upbound.io
+spec:
+ group: spaces.upbound.io
+ names:
+ categories:
+ - spaces
+ kind: Simulation
+ listKind: SimulationList
+ plural: simulations
+ singular: simulation
+ scope: Namespaced
+ versions:
+ - additionalPrinterColumns:
+ - jsonPath: .spec.controlPlaneName
+ name: SOURCE
+ type: string
+ - jsonPath: .status.simulatedControlPlaneName
+ name: SIMULATED
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='AcceptingChanges')].status
+ name: ACCEPTING-CHANGES
+ type: string
+ - jsonPath: .status.conditions[?(@.type=='AcceptingChanges')].reason
+ name: STATE
+ type: string
+ - jsonPath: .metadata.creationTimestamp
+ name: AGE
+ type: date
+ name: v1alpha1
+ schema:
+ openAPIV3Schema:
+ description: |-
+ A Simulation creates a simulation of a source ControlPlane. You can apply a
+ change set to the simulated control plane. When the Simulation is complete it
+ will detect the changes and report the difference compared to the source
+ control plane.
+ properties:
+ apiVersion:
+ description: |-
+ APIVersion defines the versioned schema of this representation of an object.
+ Servers should convert recognized schemas to the latest internal value, and
+ may reject unrecognized values.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
+ type: string
+ kind:
+ description: |-
+ Kind is a string value representing the REST resource this object represents.
+ Servers may infer this from the endpoint the client submits requests to.
+ Cannot be updated.
+ In CamelCase.
+ More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
+ type: string
+ metadata:
+ type: object
+ spec:
+ description: SimulationSpec specifies how to run the simulation.
+ properties:
+ completionCriteria:
+ description: |-
+ CompletionCriteria specify how Spaces should determine when the
+ simulation is complete. If any of the criteria are met, Spaces will set
+ the Simulation's desired state to complete. Omit the criteria if you want
+ to manually mark the Simulation complete.
+ items:
+ description: A CompletionCriterion specifies when a simulation is
+ complete.
+ properties:
+ duration:
+ description: Duration after which the simulation is complete.
+ type: string
+ type:
+ description: Type of criterion.
+ enum:
+ - Duration
+ type: string
+ required:
+ - duration
+ - type
+ type: object
+ type: array
+ controlPlaneName:
+ description: |-
+ ControlPlaneName is the name of the ControlPlane to simulate a change to.
+ This control plane is known as the Simulation's 'source' control plane.
+ minLength: 1
+ type: string
+ x-kubernetes-validations:
+ - message: The source controlplane can't be changed
+ rule: self == oldSelf
+ desiredState:
+ default: AcceptingChanges
+ description: DesiredState of the simulation.
+ enum:
+ - AcceptingChanges
+ - Complete
+ - Terminated
+ type: string
+ x-kubernetes-validations:
+ - message: A complete Simulation can only be terminated
+ rule: oldSelf != 'Complete' || self == 'Complete' || self == 'Terminated'
+ - message: A Simulation can't be un-terminated
+ rule: oldSelf != 'Terminated' || self == oldSelf
+ required:
+ - controlPlaneName
+ - desiredState
+ type: object
+ status:
+ description: SimulationStatus represents the observed state of a Simulation.
+ properties:
+ changes:
+ description: |-
+ Changes detected by the simulation. Only changes that happen while the
+ simulation is in the AcceptingChanges state are included.
+ items:
+ description: |-
+ A SimulationChange represents an object that changed while the simulation was
+ in the AcceptingChanges state.
+ properties:
+ change:
+ description: Change type.
+ enum:
+ - Unknown
+ - Create
+ - Update
+ - Delete
+ type: string
+ objectRef:
+ description: ObjectReference to the changed object.
+ properties:
+ apiVersion:
+ description: APIVersion of the changed resource.
+ type: string
+ kind:
+ description: Kind of the changed resource.
+ type: string
+ name:
+ description: Name of the changed resource.
+ type: string
+ namespace:
+ description: Namespace of the changed resource.
+ type: string
+ required:
+ - apiVersion
+ - kind
+ - name
+ type: object
+ required:
+ - change
+ - objectRef
+ type: object
+ type: array
+ conditions:
+ description: Conditions of the resource.
+ items:
+ description: A Condition that may apply to a resource.
+ properties:
+ lastTransitionTime:
+ description: |-
+ LastTransitionTime is the last time this condition transitioned from one
+ status to another.
+ format: date-time
+ type: string
+ message:
+ description: |-
+ A Message containing details about this condition's last transition from
+ one status to another, if any.
+ type: string
+ observedGeneration:
+ description: |-
+ ObservedGeneration represents the .metadata.generation that the condition was set based upon.
+ For instance, if .metadata.generation is currently 12, but the .status.conditions[x].observedGeneration is 9, the condition is out of date
+ with respect to the current state of the instance.
+ format: int64
+ type: integer
+ reason:
+ description: A Reason for this condition's last transition from
+ one status to another.
+ type: string
+ status:
+ description: Status of this condition; is it currently True,
+ False, or Unknown?
+ type: string
+ type:
+ description: |-
+ Type of this condition. At most one of each condition type may apply to
+ a resource at any point in time.
+ type: string
+ required:
+ - lastTransitionTime
+ - reason
+ - status
+ - type
+ type: object
+ type: array
+ x-kubernetes-list-map-keys:
+ - type
+ x-kubernetes-list-type: map
+ controlPlaneData:
+ description: |-
+ ControlPlaneData exported from the source control plane and imported to
+ the simulated control plane.
+ properties:
+ exportTimestamp:
+ description: |-
+ ExportTimestamp is the time at which the source control plane's resources
+ were exported. Resources are exported to temporary storage before they're
+ imported to the simulated control plane.
+ format: date-time
+ type: string
+ importTimestamp:
+ description: |-
+ ImportTiemstamp is the time at which the source control plane's resources
+ were imported to the simulated control plane.
+ format: date-time
+ type: string
+ type: object
+ observedGeneration:
+ description: |-
+ ObservedGeneration is the latest metadata.generation
+ which resulted in either a ready state, or stalled due to error
+ it can not recover from without human intervention.
+ format: int64
+ type: integer
+ simulatedControlPlaneName:
+ description: |-
+ SimulatedControlPlaneName is the name of the control plane used to run
+ the simulation.
+ minLength: 1
+ type: string
+ type: object
+ required:
+ - spec
+ type: object
+ served: true
+ storage: true
+ subresources:
+ status: {}