Your cloud is sprawling again. Another microservice spun up without a clear owner, one more Terraform state gone rogue, and yet the security team still wants “consistent access controls.” You need structure without killing velocity. This is where Cortex Crossplane earns its keep.
Cortex gives you observability and centralized control over microservices. Crossplane handles the infrastructure side, provisioning everything from databases to Kubernetes clusters through declarative configs. Together they promise an elegant bridge between your platform team’s ambitions and your app teams’ chaos. Think of it as GitOps for both code and cloud, running through a single vocabulary.
So what does Cortex Crossplane actually do? It connects your service definitions in Cortex to the resource claims in Crossplane. In practice, that means your Cortex catalog can declare not just APIs or owners, but also the infrastructure each service depends on. When a team adds a new service, infrastructure gets created, tagged, and governed automatically. No one waits days for manual IAM approval or yet another PR to the Terraform repo.
The integration works by mapping Cortex entities to Crossplane compositions. Each composition enforces guardrails: network policies, logging, and identity binding with providers like AWS IAM or OIDC. Secrets rotate on schedule, and RBAC syncs with your identity provider. You get dynamic environments without anyone copy-pasting YAML at 2 a.m.
Best practices
Keep roles clear. Cortex defines what the service is, Crossplane builds where it lives. Store policies in the same repo to ensure a shared source of truth. Rotate credentials through standard vaults, not ad-hoc scripts. And never let one-off overrides sneak into your control plane.