@@ -36,7 +36,7 @@ that, by default, activates **all** managed resources with a `"*"` pattern.
36
36
37
37
{{< hint "important" >}}
38
38
The default ` "*" ` activation pattern defeats the performance benefits of
39
- SafeStart by activating all resources. For this tutorial, we work with the
39
+ safe-start by activating all resources. For this tutorial, the guide works with the
40
40
default behavior, but production setups should use more selective activation.
41
41
{{< /hint >}}
42
42
@@ -46,7 +46,7 @@ Check if you have a default activation policy:
46
46
kubectl get mrap crossplane-default-activation-policy -o yaml
47
47
```
48
48
49
- You can modify the default activation policy directly:
49
+ You can edit the default activation policy directly:
50
50
51
51
{{< tabs >}}
52
52
{{< tab "Edit Existing Policy" >}}
@@ -62,7 +62,7 @@ kubectl patch mrap crossplane-default-activation-policy --type='merge' \
62
62
63
63
{{< hint "note" >}}
64
64
Changes to the default policy are permanent. After the policy exists, Crossplane
65
- won 't modify it, even if you change Helm values.
65
+ doesn 't change it, even if you change Helm values.
66
66
{{< /hint >}}
67
67
{{< /tab >}}
68
68
@@ -85,9 +85,9 @@ Learn more about configuring default activation policies during installation
85
85
and best practices in the [ MRD activation policies guide] ({{< ref "../guides/mrd-activation-policies#default-activation-policy" >}}).
86
86
{{< /hint >}}
87
87
88
- ## Install a SafeStart provider
88
+ ## Install a provider with safe-start capability
89
89
90
- Now install a provider that supports SafeStart . This provider creates MRDs
90
+ Now install a provider that supports safe-start . This provider creates MRDs
91
91
that activation policies control.
92
92
93
93
``` yaml
@@ -123,7 +123,7 @@ NAME INSTALLED HEALTHY PACKAGE
123
123
provider-aws True True xpkg.upbound.io/crossplane-contrib/provider-aws 2m
124
124
```
125
125
126
- ## Examine the MRDs
126
+ ## Examine the managed resource definitions
127
127
128
128
List the MRDs created by the provider:
129
129
@@ -146,7 +146,7 @@ clusters.eks.aws.crossplane.io Active 2m
146
146
# ... many more, all Active
147
147
```
148
148
149
- The default policy activates all MRDs, so SafeStart providers behave like
149
+ The default policy activates all MRDs, so safe-start providers behave like
150
150
traditional providers.
151
151
{{< /tab >}}
152
152
@@ -162,14 +162,14 @@ clusters.eks.aws.crossplane.io Inactive 2m
162
162
# ... many more, all Inactive
163
163
```
164
164
165
- This demonstrates true SafeStart behavior where resources must be explicitly
165
+ This demonstrates true safe-start behavior where resources must be explicitly
166
166
activated.
167
167
{{< /tab >}}
168
168
{{< /tabs >}}
169
169
170
170
{{< hint "note" >}}
171
- For the rest of this tutorial, we assume you have default activation
172
- disabled to demonstrate selective activation. If you have default activation
171
+ For the rest of this tutorial, the guide assumes you have default activation
172
+ disabled to show selective activation. If you have default activation
173
173
enabled, the MRDs are already active.
174
174
{{< /hint >}}
175
175
@@ -195,7 +195,7 @@ spec:
195
195
type : string
196
196
` ` `
197
197
198
- ## Verify CRD creation behavior
198
+ ## Verify resource creation behavior
199
199
200
200
The presence of CRDs depends on whether MRDs are active:
201
201
@@ -207,8 +207,8 @@ Because MRDs are active due to the default `"*"` policy, CRDs exist:
207
207
kubectl get crds | grep aws.crossplane.io | wc -l
208
208
```
209
209
210
- This shows many CRDs ( 100+) , demonstrating that active MRDs
211
- create CRDs immediately .
210
+ This shows 100+ CRDs , demonstrating that active MRDs
211
+ create CRDs.
212
212
{{< /tab >}}
213
213
214
214
{{< tab "With Disabled Default Activation" >}}
@@ -288,9 +288,9 @@ dbinstances.rds.aws.crossplane.io Active 5m
288
288
# ... other RDS resources
289
289
```
290
290
291
- ## Verify CRDs are created
291
+ ## Verify custom resource definition creation
292
292
293
- Now that MRDs are active, CRDs should exist:
293
+ Now that MRDs are active, CRDs exist:
294
294
295
295
``` shell
296
296
kubectl get crds | grep -E " (instances.ec2|buckets.s3|rds)" | head -5
@@ -321,8 +321,8 @@ spec:
321
321
` ` `
322
322
323
323
{{< hint "note" >}}
324
- This example assumes you have AWS credentials configured. See the
325
- [AWS Provider documentation]({{< ref "../guides/aws-provider " >}}) for
324
+ This example assumes you have AWS credentials configured. See
325
+ [ProviderConfig documentation]({{< ref "../managed-resources/managed-resources#providerconfigref " >}}) for
326
326
authentication setup.
327
327
{{< /hint >}}
328
328
@@ -428,16 +428,16 @@ status:
428
428
Compare the resource usage with traditional provider installation:
429
429
430
430
** Without MRDs (traditional):**
431
- - All ~ 200 AWS CRDs created immediately
431
+ - All ~ 200 AWS CRDs created when provider installs
432
432
- Higher memory usage in kube-apiserver
433
433
- Longer provider installation time
434
434
435
435
** With MRDs and selective activation:**
436
- - Only activated CRDs created (~ 10- 20 in this example)
436
+ - Only activated CRDs created (10 to 20 in this example)
437
437
- Lower memory footprint
438
438
- Faster resource discovery and management
439
439
440
- Check the number of AWS CRDs currently in your cluster:
440
+ Check the number of AWS CRDs in your cluster:
441
441
442
442
``` shell
443
443
kubectl get crds | grep aws.crossplane.io | wc -l
@@ -463,7 +463,7 @@ spec:
463
463
EOF
464
464
```
465
465
466
- The activations from both policies are combined , giving you fine-grained
466
+ Both policies combine their activations , giving you fine-grained
467
467
control over resource availability.
468
468
469
469
## Clean up
@@ -522,9 +522,9 @@ Now that you understand MRDs and activation policies, you can:
522
522
* **Optimize cluster performance** by using selective activation
523
523
* **Improve resource discovery** through MRD connection details documentation
524
524
* **Implement environment-specific policies** for different deployment stages
525
- * **Plan provider adoption** using SafeStart -capable providers
525
+ * **Plan provider adoption** using safe-start -capable providers
526
526
527
527
Learn more about:
528
528
* [MRD activation policies best practices]({{< ref "../guides/mrd-activation-policies" >}}) - Comprehensive guide including default policy configuration
529
529
* [Managed Resource Definitions concepts]({{< ref "managed-resource-definitions" >}})
530
- * [Provider capabilities and SafeStart ]({{< ref "../packages/provider-capabilities" >}})
530
+ * [Provider capabilities and safe-start ]({{< ref "../packages/provider-capabilities" >}})
0 commit comments