All posts

The simplest way to make Crossplane OpenEBS work like it should

You spin up cloud resources in seconds, but storage still feels stuck in 2010. Persistent volumes go missing, YAML drifts, and the team blames the cluster again. That’s the daily grind Crossplane and OpenEBS were built to fix, if you wire them together correctly. Crossplane gives you infrastructure as code that runs inside Kubernetes. It lets you define managed resources just like any other CRD, so developers can request AWS buckets or GCP databases with the same control loop that handles Pods.

Free White Paper

Crossplane Composition Security + End-to-End Encryption: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You spin up cloud resources in seconds, but storage still feels stuck in 2010. Persistent volumes go missing, YAML drifts, and the team blames the cluster again. That’s the daily grind Crossplane and OpenEBS were built to fix, if you wire them together correctly.

Crossplane gives you infrastructure as code that runs inside Kubernetes. It lets you define managed resources just like any other CRD, so developers can request AWS buckets or GCP databases with the same control loop that handles Pods. OpenEBS, on the other hand, provides dynamic, container-native storage. It carves out block storage per workload, keeping data close to the app. Combine them and you get cloud-scale provisioning with self-service persistence, minus the manual tickets.

Here’s how the pairing works. Crossplane defines an abstraction layer for cloud providers, so your database or volume claim becomes a portable spec. OpenEBS takes that claim and binds real storage classes to it inside the cluster. You create a CompositeResourceDefinition for a persistent service, such as a replicated Postgres instance. Crossplane spins up the underlying compute nodes, while OpenEBS ensures the volumes survive when nodes or pods move. The result is declarative infrastructure where data isn’t a separate concern; it’s part of the same control loop.

Take care with permissions. Map your RBAC roles to OpenEBS storage classes up front to avoid noisy access errors. Store cloud credentials in provider secrets, not inline manifests. For advanced setups, use OIDC with your identity provider, such as Okta or AWS IAM, so audits stay centralized. When Crossplane and OpenEBS share a common IAM source, you can trace every resource back to a user or pipeline.

Quick Answer: You can connect Crossplane and OpenEBS by defining storage claims in Crossplane that reference OpenEBS storage classes. Crossplane provisions the infrastructure, while OpenEBS provides persistent volumes dynamically inside the same Kubernetes cluster.

Continue reading? Get the full guide.

Crossplane Composition Security + End-to-End Encryption: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

The main benefits show up fast:

  • Fewer manual steps and drift-free persistent storage.
  • Consistent recovery after node failure or updates.
  • Unified policy control for both cloud and storage.
  • Predictable infrastructure costs through reusable templates.
  • Faster developer onboarding and clearer audit trails.

For teams chasing developer velocity, this combo feels natural. Backends get persistent volumes out of the box. Operators stop fighting over who owns the PVC definitions. Everyone writes the same declarative YAML and ships sooner. It’s autonomy without the chaos.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of debugging who can create what, you plug your identity provider once and enforce access everywhere, across both Crossplane and OpenEBS resources.

AI copilots are starting to make these integrations even easier. A prompt can draft your CompositeResourceDefinitions, but policy still matters. Let AI suggest, not decide. The same guardrails protect you from drifting into an unreviewed cloud resource farm.

In short, Crossplane with OpenEBS aligns the entire stack around one truth: everything, even storage, should be declarative, auditable, and fast.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts