CLI Reference
This documentation is for the up CLI v0.41.0.
The latest version of up can be installed by running:
curl -sL "https://cli.upbound.io" | sh
up
The Upbound CLI
Please report issues and feature requests at https://github.com/upbound/upbound.
Usage
up <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--help | -h | Show context-sensitive help. |
--format | Format for get/list commands. Can be: json, yaml, default | |
--quiet | -q | Suppress all output. |
--pretty | Pretty print output. | |
--dry-run | dry-run output. |
up completion
Generate shell autocompletions
Usage
up completion [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--uninstall |
up composition
Manage Compositions.
Usage
up composition <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up composition generate
Generate a Composition.
The generate command creates a composition and adds the required function
packages to the project as dependencies.
Examples
Generate a composition from a CompositeResourceDefinition (XRD) and save output
to apis/xnetworks/composition.yaml:
up composition generate apis/xnetwork/definition.yaml
Generate a composition from a Composite Resource (XR) and save output to
apis/xnetworks/composition.yaml:
up composition generate examples/xnetwork/xnetwork.yaml
Generate a composition from a Composite Resource (XR), prefixing the
metadata.name with aws and save output to
apis/xnetworks/composition-aws.yaml:
up composition generate examples/network/network-aws.yaml --name aws
Generate a composition from a Composite Resource (XR) with a custom plural form
and save output to apis/xdatabases/composition.yaml:
up composition generate examples/xdatabase/database.yaml --plural postgreses
Usage
up composition generate <resource> [flags]
Arguments
| Argument | Description |
|---|---|
<resource> | File path to Composite Resource Claim (XRC) or Composite Resource (XR) or CompositeResourceDefinition (XRD). |
Flags
| Flag | Short Form | Description |
|---|---|---|
--name | Name for the new composition. | |
--plural | Optional custom plural for the CompositeTypeRef.Kind | |
--path | Optional path to the output file where the generated Composition will be saved. | |
--project-file | -f | Path to project definition file. |
--output | -o | Output format for the results: 'file' to save to a file, 'yaml' to print XRD in YAML format, 'json' to print XRD in JSON format. |
--cache-dir | Directory used for caching dependency images. |
up composition render
Run a composition locally to render an XR into composed resources.
The render command shows you what composed resources Crossplane would create
by printing them to stdout. It also prints any changes that would be made to the
status of the XR. It doesn't talk to Crossplane. Instead it runs the Composition
Function pipeline specified by the Composition locally, and uses that to render
the XR.
Examples
Simulate creating a new XR:
up composition render composition.yaml xr.yaml
Simulate updating an XR that already exists:
up composition render composition.yaml xr.yaml \
--observed-resources=existing-observed-resources.yaml
Pass context values to the Function pipeline:
up composition render composition.yaml xr.yaml \
--context-values=apiextensions.crossplane.io/environment='{"key": "value"}'
Pass extra resources requested by functions in the pipeline:
up composition render composition.yaml xr.yaml \
--extra-resources=extra-resources.yaml
Pass credentials needed by functions in the pipeline:
up composition render composition.yaml xr.yaml \
--function-credentials=credentials.yaml
Docker Configuration
The render command uses Docker (or any Docker-compatible container runtime) to run composition functions. Configure the Docker connection using these standard environment variables:
DOCKER_HOST: Docker daemon socket (e.g.,unix:///var/run/docker.sock)DOCKER_API_VERSION: Docker API version to useDOCKER_CERT_PATH: Path to Docker TLS certificatesDOCKER_TLS_VERIFY: Enable TLS verification (1 or 0)
Usage
up composition render <composition> <composite-resource> [flags]
Arguments
| Argument | Description |
|---|---|
<composition> | A YAML file specifying the Composition to use to render the Composite Resource (XR). |
<composite-resource> | A YAML file specifying the Composite Resource (XR) to render. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--xrd | A YAML file specifying the CompositeResourceDefinition (XRD) to validate the XR against. | |
--context-files | Comma-separated context key-value pairs to pass to the Function pipeline. Values must be files containing JSON. | |
--context-values | Comma-separated context key-value pairs to pass to the Function pipeline. Values must be JSON. Keys take precedence over --context-files. | |
--include-function-results | -r | Include informational and warning messages from Functions in the rendered output as resources of kind: Result. |
--include-full-xr | -x | Include a direct copy of the input XR's spec and metadata fields in the rendered output. |
--observed-resources | -o | A YAML file or directory of YAML files specifying the observed state of composed resources. |
--extra-resources | -e | A YAML file or directory of YAML files specifying extra resources to pass to the Function pipeline. |
--include-context | -c | Include the context in the rendered output as a resource of kind: Context. |
--function-credentials | A YAML file or directory of YAML files specifying credentials to use for Functions to render the XR. | |
--timeout | How long to run before timing out. | |
--max-concurrency | Maximum number of functions to build at once. | |
--project-file | -f | Path to project definition file. |
--cache-dir | Directory used for caching dependency images. | |
--no-build-cache | Don't cache image layers while building. | |
--build-cache-dir | Path to the build cache directory. |
up config
Manage global configuration settings.
Usage
up config <command> [flags]
up config get
Get configuration values.
The get command shows global configuration values for the up CLI.
Configuration Keys
telemetry.disabled: Controls whether anonymous telemetry is collected.
Usage
up config get
up config set
Set configuration values.
The set command sets a global configuration value for the up CLI.
Configuration Keys
telemetry.disabled: Set to true to disable collection of anonymous telemetry.
Examples
Disable collection of anonymous telemetry:
up config set telemetry.disabled true
Usage
up config set <key> <value>
Arguments
| Argument | Description |
|---|---|
<key> | Configuration key to set. |
<value> | Configuration value to set. |
up controlplane
Interact with control planes.
Usage
up controlplane <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up controlplane api-connector
Connect an App Cluster to a control plane using API Connector.
Usage
up controlplane api-connector <command> [flags]
up controlplane api-connector install
Install api-connector into an consumer cluster.
The install command installs the API Connector into a consumer cluster.
Note that the API Connector is a preview feature, under active development and subject to breaking changes. Production use is not recommended.
Examples
Install the API Connector into the consumer cluster and connect it to the control plane referred to by the current context:
up controlplane api-connector install --consumer-kubeconfig /path/to/kubeconfig
Install the API Connector into the cluster and connect it to the control plane referred to by the current context using the provided robot name for authentication:
up controlplane api-connector install --consumer-kubeconfig /path/to/kubeconfig \
--robot-name upbound-robot-name
Install the API Connector into the cluster but do not provision a
ClusterConnection resource or create a robot for authentication:
up controlplane api-connector install --consumer-kubeconfig /path/to/kubeconfig \
--skip-connection
Usage
up controlplane api-connector install [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--upgrade | Upgrade or downgrade the API Connector to --version, even if it is already installed. | |
--version | Version of the API Connector to install. If not provided, the latest, known to CLI, will be installed. | |
--name | Name of the related objects for named connection. If not provided, control plane name will be used with api-connector prefix. | |
--upbound-token | API token used to authenticate to the provider control plane. Mutually exclusive with --robot-name. | |
--skip-connection | Skip secret and connection initialization to the control plane. If provided, the connector will be installed without connecting to the control plane. | |
--consumer-kubeconfig | Path to the kubeconfig file for the consumer cluster. If not provided, the default kubeconfig resolution will be used. | |
--consumer-context | Context to use in the kubeconfig file. If not provided, the current context will be used. | |
--helm-directory | Directory to store the Helm chart. If not provided, the default will be used. | |
--set | Set parameters. | |
--file | -f | Parameters file. |
--bundle | Local bundle path. |
up controlplane api-connector uninstall
Uninstall api-connector from an consumer cluster.
The uninstall command uninstalls the API Connector from a cluster.
Examples
Uninstall the API Connector from the cluster but leave the connections and secrets in place:
up controlplane api-connector uninstall --target-kubeconfig kubeconfig-path-for-deployment-cluster
Uninstall the API Connector from the cluster and delete the connections and secrets. API objects created by the API Connector initial installation will not be deleted:
up controlplane api-connector uninstall --all --target-kubeconfig kubeconfig-path-for-deployment-cluster
Usage
up controlplane api-connector uninstall --consumer-kubeconfig=STRING [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--consumer-kubeconfig | Required Path to the kubeconfig file for the consumer cluster. If not provided, the default kubeconfig resolution will be used. | |
--consumer-context | Context to use in the kubeconfig file. If not provided, the current context will be used. | |
--all | Uninstall all resources including the connectors and secrets. If not provided, only the connector will be uninstalled. |
up controlplane configuration
Manage Configurations.
Usage
up controlplane configuration <command> [flags]
up controlplane configuration install
Install a Configuration.
Usage
up controlplane configuration install <package> [flags]
Arguments
| Argument | Description |
|---|---|
<package> | Reference to the Configuration. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--name | Name of Configuration. | |
--package-pull-secrets | List of secrets used to pull Configuration. | |
--wait | -w | Wait duration for successful Configuration installation. |
up controlplane connector
Connect an App Cluster to a control plane using MCP Connector.
Usage
up controlplane connector <command> [flags]
up controlplane connector install
Install mcp-connector into an App Cluster.
Usage
up controlplane connector install <name> <namespace> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of control plane. |
<namespace> | Namespace in the control plane where the claims of the cluster will be stored. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--token | API token used to authenticate. If not provided, a new robot and a token will be created. | |
--cluster-name | Name of the cluster connecting to the control plane. If not provided, the namespace argument value will be used. | |
--installation-namespace | -n | Kubernetes namespace for MCP Connector. Default is kube-system. |
--control-plane-secret | Name of the secret that contains the kubeconfig for a control plane. | |
--set | Set parameters. | |
--file | -f | Parameters file. |
--bundle | Local bundle path. |
up controlplane connector uninstall
Uninstall mcp-connector from an App Cluster.
Usage
up controlplane connector uninstall <namespace> [flags]
Arguments
| Argument | Description |
|---|---|
<namespace> | Namespace in the control plane where the claims of the cluster will be stored. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--cluster-name | Name of the cluster connecting to the control plane. If not provided, the namespace argument value will be used. | |
--installation-namespace | -n | Kubernetes namespace for MCP Connector. Default is kube-system. |
up controlplane create
Create a Spaces control plane.
Usage
up controlplane create <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of control plane. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
--crossplane-version | The version of Universal Crossplane to use. The default depends on the selected auto-upgrade channel. | |
--crossplane-channel | The Crossplane auto-upgrade channel to use. Must be one of: None, Patch, Stable, Rapid | |
--secret-name | The name of the control plane's secret. Defaults to 'kubeconfig-{control plane name}'. Only applicable for Space control planes. |
up controlplane delete
Delete a Spaces control plane.
Usage
up controlplane delete <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of control plane. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
up controlplane function
Manage Functions.
Usage
up controlplane function <command> [flags]
up controlplane function install
Install a Function.
Usage
up controlplane function install <package> [flags]
Arguments
| Argument | Description |
|---|---|
<package> | Reference to the Function. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--name | Name of Function. | |
--package-pull-secrets | List of secrets used to pull Function. | |
--wait | -w | Wait duration for successful Function installation. |
up controlplane get
Get a single Spaces control plane.
Usage
up controlplane get <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of control plane. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
up controlplane list
List control planes in a Space.
Usage
up controlplane list [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--all-groups | -A | List control planes across all groups. |
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
up controlplane migration
Migrate control planes to Upbound Managed Control Planes.
The migration command seamlessly migrates control plane resources from
Crossplane or Upbound Crossplane (UXP) environments to Managed Control Planes in
Upbound Spaces.
This command simplifies the process of transferring your existing Crossplane configurations and states into the Upbound platform, ensuring a smooth transition with minimal downtime.
For detailed information on each command and its options, use the --help flag
with the specific command (e.g., up controlplane migration export --help).
Usage
up controlplane migration <command> [flags]
up controlplane migration export
The 'export' command is used to export the current state of a Crossplane or Universal Crossplane (xp/uxp) control plane into an archive file. This file can then be used for migration to Upbound Managed Control Planes.
The export command exports resources from a Crossplane or Upbound Crossplane
(UXP) cluster to a tarball, for migration to an Upbound Managed Control Plane.
Use the available options to customize the export process, such as specifying the output file path, including or excluding specific resources and namespaces, and deciding whether to pause claim,composite,managed resources before exporting.
Examples
Pause all claims, composites, and managed resources before exporting the control
plane state. The state is exported to the default archive file named
xp-state.tar.gz. Resources that were already paused will be annotated with
migration.upbound.io/already-paused: "true" to preserve their paused state
during the import process:
up migration export --pause-before-export
Export the control plane state to a file called my-export.tar.gz:
up migration export --output=my-export.tar.gz
Export the control plane state from only the provided namespaces to the default
file, xp-state.tar.gz, with the additional resources specified:
up migration export --include-extra-resources="customresource.group" \
--include-namespaces="crossplane-system,team-a,team-b"
Usage
up controlplane migration export [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--yes | When set to true, automatically accepts any confirmation prompts that may appear during the export process. | |
--output | -o | Specifies the file path where the exported archive will be saved. Defaults to 'xp-state.tar.gz'. |
--include-extra-resources | A list of extra resource types to include in the export in "resource.group" format in addition to all Crossplane resources. By default, it includes namespaces, configmaps, secrets. | |
--exclude-resources | A list of resource types to exclude from the export in "resource.group" format. No resources are excluded by default. | |
--include-namespaces | A list of specific namespaces to include in the export. If not specified, all namespaces are included by default. | |
--exclude-namespaces | A list of specific namespaces to exclude from the export. Defaults to 'kube-system', 'kube-public', 'kube-node-lease', and 'local-path-storage'. | |
--pause-before-export | When set to true, pauses all claim,composite and managed resources before starting the export process. This can help ensure a consistent state for the export. Defaults to false. |
up controlplane migration import
The 'import' command imports a control plane state from an archive file into an Upbound managed control plane.
The import command imports resources from an exported bundle into a Managed
Control Plane.
By default, all managed resources will be paused during the import process for possible manual inspection/validation. You can use the --unpause-after-import flag to automatically unpause all claim,composite,managed resources after the import process completes.
Examples
Automatically import the control plane state from my-export.tar.gz. Claim and
composite resources that were paused during export will remain paused. Managed
resources will be paused. If they were already paused during export, the
annotation migration.upbound.io/already-paused: "true" will be added to
preserve their paused state:
up migration import --input=`my-export.tar.gz`
Automatically import and unpause claims, composites, and managed resources after
importing them. Resources with the annotation
migration.upbound.io/already-paused: "true" will remain paused:
up migration import --unpause-after-import
Automatically import and unpause claims, composites, and managed resources after
importing them. The metadata.name of claims will be adjusted for MCP Connector
compatibility, and the corresponding composite's claimRef will also be
updated. Resources annotated with migration.upbound.io/already-paused: "true"
will remain paused:
up migration import --unpause-after-import --mcp-connector-claim-namespace=default \
--mcp-connector-cluster-id=my-cluster-id
Usage
up controlplane migration import [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--yes | When set to true, automatically accepts any confirmation prompts that may appear during the import process. | |
--input | -i | Specifies the file path or directory of the archive to be imported. The default path is 'xp-state.tar.gz'. |
--unpause-after-import | When set to true, automatically unpauses all managed resources that were paused during the import process. This helps in resuming normal operations post-import. Defaults to false, requiring manual unpausing of resources if needed. | |
--mcp-connector-cluster-id | MCP Connector cluster ID. Required for importing claims supported my MCP Connector. | |
--mcp-connector-claim-namespace | MCP Connector claim namespace. Required for importing claims supported by MCP Connector. | |
--skip-target-check | When set to true, skips the check for a local or managed control plane during import. |
up controlplane migration pause-toggle
The 'pause-toggle' command is used to pause or unpause resources affected by a migration, ensuring that only migration-induced pauses are undone.
The pause-toggle command allows you to manage the paused state of resources
after a migration attempt.
- When
--pause=true, all resources in the target control plane will be paused due to a faulty migration. This is useful after runningmigration import --unpause-after-import=trueand discovering issues in the target. - When
--pause=false, only resources paused during the migration will be unpaused in the source control plane, ensuring that pre-existing paused resources remain unchanged.
Examples
Pause all resources in the target control plane after a migration if the import caused issues. Useful for stopping resources in a faulty target environment:
up migration pause-toggle --pause=true
Unpause only the resources that were paused in the source control plane due to migration. This is helpful when reverting migration-induced pauses in the source after a failed import to the target.
up migration pause-toggle --pause=false
Usage
up controlplane migration pause-toggle [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--pause | Set to 'true' to pause all resources in the target control plane after a faulty migration, or 'false' to remove the paused annotation in the source control plane after a failed migration. | |
--yes | When set to true, automatically accepts any confirmation prompts that may appear during the process. |
up controlplane oidc-auth
Create OIDC ProviderConfig in a Spaces control plane and Cloud Resources.
Usage
up controlplane oidc-auth <command> [flags]
up controlplane oidc-auth aws
Create OIDC ProviderConfig and AWS Resources
The oidc-auth command sets up OIDC authentication between an Upbound Cloud
Control Plane and AWS using an AWS IAM Identity Provider.
This command requires the AWS CLI.
Examples
Check if the IAM IdentityProvider proidc.upbound.io exists and create it if
needed. Create an IAM Role trusted by the identity provider and attach the
AdministratorAccess policy. Configure the control plane with a
ProviderConfig for provider-aws:
up ctp oidc-auth aws example-project-aws-up-cli arn:aws:iam::aws:policy/AdministratorAccess
Check if the IAM IdentityProvider proidc.upbound.io exists and create it if
needed. Create an IAM Role with a trust policy using a wildcard match
(StringLike) on sub. Useful for allowing access from multiple control planes
matching the pattern:
up ctp oidc-auth aws example-project-aws-up-cli arn:aws:iam::aws:policy/AdministratorAccess \
--sub 'example-*'
Check if the IAM IdentityProvider example.upbound.io exists and create it if
needed. Create an IAM Role trusted by the specified identity provider and attach
the AdministratorAccess policy. Configure the control plane with the
appropriate ProviderConfig for provider-aws:
up ctp oidc-auth aws example-project-aws-up-cli arn:aws:iam::aws:policy/AdministratorAccess \
--oidc-provider-name example.upbound.io
Show the AWS CLI commands that would be executed to set up OIDC without actually running them:
up ctp oidc-auth aws example-project-aws-up-cli arn:aws:iam::aws:policy/AdministratorAccess \
--dry-run
Usage
up controlplane oidc-auth aws <name> <policy> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | AWS IAM Role Name |
<policy> | AWS IAM Policy ARN |
Flags
| Flag | Short Form | Description |
|---|---|---|
--oidc-provider-name | AWS Identity Provider - OIDC Provider Name | |
--provider-config-name | Provider AWS ProviderConfigName | |
--sub | Define the control plane name that the IAM Role trust policy will use in the 'sub' claim. Supports wildcards (using StringLike). | |
--yes | When set to true, automatically accepts any confirmation prompts. |
up controlplane provider
Manage Providers.
Usage
up controlplane provider <command> [flags]
up controlplane provider install
Install a Provider.
Usage
up controlplane provider install <package> [flags]
Arguments
| Argument | Description |
|---|---|
<package> | Reference to the Provider. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--name | Name of Provider. | |
--package-pull-secrets | List of secrets used to pull Provider. | |
--wait | -w | Wait duration for successful Provider installation. |
up controlplane pull-secret
Manage package pull secrets.
Usage
up controlplane pull-secret <command> [flags]
up controlplane pull-secret create
Create a package pull secret.
Usage
up controlplane pull-secret create <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of the pull secret. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--file | -f | Path to credentials file. Credentials from profile are used if not specified. |
--namespace | -n | Kubernetes namespace for pull secret. |
up controlplane simulate
Alias for 'up controlplane simulation create'.
Usage
up controlplane simulate --changeset=CHANGESET,... <source-name> [flags]
Arguments
| Argument | Description |
|---|---|
<source-name> | Name of source control plane. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
--simulation-name | -n | The name of the simulation resource |
--changeset | -f | Required Path to the resources that will be applied as part of the simulation. Can either be a single file or a directory |
--recursive | -r | Process the directory used in -f, --changeset recursively. |
--complete-after | The maximum amount of time the simulated control plane should run before ending the simulation | |
--fail-on | Fail and exit with a code of '1' if a certain condition is met | |
--output | -o | Output the results of the simulation to the provided file. Defaults to standard out if not specified |
--wait | Wait for the simulation to complete. If set to false, the command will exit immediately after the changeset is applied | |
--terminate-on-finish | Terminate the simulation after the completion criteria is met |
up controlplane simulation
Manage control plane simulations.
The simulation command manages control plane simulations. Simulations allow
you to see what changes would occur in a control plane after applying a set of
changes.
Examples
Create a new simulation for the specified control plane, wait for the simulation to complete, then shows results:
up controlplane simulation create control-plane-name
List all simulations for the current context:
up controlplane simulation list
Delete a simulation, removing the simulation results and resources:
up controlplane simulation delete simulation-name
Usage
up controlplane simulation <command> [flags]
up controlplane simulation create
Start a new control plane simulation and wait for the results.
Usage
up controlplane simulation create --changeset=CHANGESET,... <source-name> [flags]
Arguments
| Argument | Description |
|---|---|
<source-name> | Name of source control plane. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The control plane group that the control plane is contained in. This defaults to the group specified in the current context |
--simulation-name | -n | The name of the simulation resource |
--changeset | -f | Required Path to the resources that will be applied as part of the simulation. Can either be a single file or a directory |
--recursive | -r | Process the directory used in -f, --changeset recursively. |
--complete-after | The maximum amount of time the simulated control plane should run before ending the simulation | |
--fail-on | Fail and exit with a code of '1' if a certain condition is met | |
--output | -o | Output the results of the simulation to the provided file. Defaults to standard out if not specified |
--wait | Wait for the simulation to complete. If set to false, the command will exit immediately after the changeset is applied | |
--terminate-on-finish | Terminate the simulation after the completion criteria is met |
up controlplane simulation delete
Delete a control plane simulation.
Usage
up controlplane simulation delete <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of the simulation. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--group | -g | The group that the simulation is contained in. This defaults to the group specified in the current context |
up controlplane simulation list
List control plane simulations for the account.
Usage
up controlplane simulation list [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--all-groups | -A | List simulations across all groups. |
--group | -g | The group that the simulation is contained in. This defaults to the group specified in the current context |
up ctx
Select an Upbound kubeconfig context.
Usage
up ctx [<argument>] [flags]
Arguments
| Argument | Description |
|---|---|
<argument> | Optional .. to move to the parent, '-' for the previous context, '.' for the current context, or any relative path. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. | |
--short | -s | Short output. |
--context | Kubernetes context to operate on. | |
--file | -f | Kubeconfig to modify when saving a new context. Overrides the --kubeconfig flag. Use '-' to write to standard output. |
up dependency
Manage configuration dependencies.
The dependency command manages dependencies of the project in the current
directory. It caches package information in a local file system cache (by
default in ~/.up/cache) and manages language schemas that can be used for
building functions.
Usage
up dependency <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up dependency add
Add a dependency to the current project.
The add command retrieves a Crossplane package from a specified registry with
an optional version tag and adds it to a project as a dependency. Language
schemas will be added to the project if the package provides them.
API dependencies can be added using the --api flag. This automatically
generates schemas for the dependency.
Examples
Retrieve the latest available version of the EKS provider, add all CRDs to the
cache folder, and place language schemas in the project's .up/ folder:
up dependency add xpkg.upbound.io/upbound/provider-aws-eks
Retrieves the latest available version greater than v1.1.0 of the
platform-ref-aws configuration, add all XRDs to the cache folder, and place
language schemas in the project's .up/ folder:
up dependency add 'xpkg.upbound.io/upbound/platform-ref-aws:>v1.1.0'
Retrieves version v0.4.1 of function-status-transformer:
up dependency add 'xpkg.upbound.io/crossplane-contrib/function-status-transformer:>v0.4.1'
Add core resources from Kubernetes v1.33.0 as an API dependency, adding language
schemas to the project's .up/ folder:
up dependency add --api k8s:v1.33.0
Add a specific CRD from an HTTP URL as an API dependency, adding language
schemas to the project's .up/ folder:
up dependency add --api https://raw.githubusercontent.com/cert-manager/cert-manager/refs/heads/master/deploy/crds/cert-manager.io_certificaterequests.yaml
Add CRDs from a git repository as an API dependency, adding language schemas to
the project's .up/ folder:
up dependency add --api https://github.com/kubernetes-sigs/cluster-api \
--git-ref=release-1.11 --git-path=config/crd/bases
Usage
up dependency add <package> [flags]
Arguments
| Argument | Description |
|---|---|
<package> | Package to be added. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--project-file | -f | Path to project definition file. |
--api | Treat the dependency as an API dependency (k8s or CRD). | |
--git-ref | Git ref for CRD dependencies (branch, tag, or commit SHA). If provided, the CRD will be fetched from git. | |
--git-path | Path within the git repository for CRD dependencies. | |
--cache-dir | Directory used for caching package images. |
up dependency clean-cache
Clean the dependency cache.
The clean-cache command removes all cached package images from the local cache
directory. This can help free up disk space or resolve issues with corrupted
cache entries.
Examples
Clean the default cache directory (~/.up/cache/), removing all cached package images:
up dependency clean-cache
Clean a custom cache directory, for example in a CI/CD environment where a shared cache is used:
up dependency clean-cache --cache-dir /path/to/cache
Usage
up dependency clean-cache [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--cache-dir | Directory used for caching package images. |
up dependency update-cache
Update the dependency cache for the current project.
The update-cache command updates the local dependency cache for the current
project. It downloads and caches all dependencies specified in the project's
upbound.yaml file.
Examples
up dependency update-cache
Updates cache for all dependencies in upbound.yaml. Uses default cache directory (~/.up/cache/).
up dependency update-cache --cache-dir `path/to/cache`
Updates cache using a custom cache directory. Useful for CI/CD environments.
up dependency update-cache -f `custom-project.yaml`
Updates cache for dependencies in a custom project file. Default is upbound.yaml.
Usage
up dependency update-cache [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--project-file | -f | Path to project definition file. |
--cache-dir | Directory used for caching package images. |
up example
Manage Claim(XRC) or Composite Resource(XR).
Usage
up example <command> [flags]
up example generate
Generate an Example Composite Resource (XR) or Claim (XRC)
The generate command is used to create an example Composite Resource (XR) or
Composite Resource Claim (XRC). For v2 projects only Composite Resources (XRs)
are supported. XRs are namespace-scoped by default, but you can choose
cluster-scoped using the --scope=cluster flag.
Examples
Creates an example Composite Resource (XR) or Composite Resource Claim (XRC) resource using an interactive wizard:
up example generate
Create an example named example in the namespace default using an
interactive wizard to collect additional inputs:
up example generate --name example --namespace default
Create an example Composite Resource Claim (XRC) with specified api-group, api-version, kind, and name, using an interactive wizard to collect additional inputs:
up example generate --type claim --api-group platform.example.com \
--api-version v1beta1 --kind Cluster --name example
Create an example Composite Resource (XR) or Composite Resource Claim (XRC) based on the fields and default values in an existing CompositeResourceDefinition (XRD). Use an interactive wizard to collect inputs:
up example generate apis/xnetworks/definition.yaml
Create an example Composite Resource (XR) based on the fields and default values in an existing CompositeResourceDefinition (XRD). Use an interactive wizard to collect inputs:
up example generate apis/xnetworks/definition.yaml --type xr
Usage
up example generate [<xrd-file-path>] [flags]
Arguments
| Argument | Description |
|---|---|
<xrd-file-path> | Optional Specifies the path to the Composite Resource Definition (XRD) file used to generate an example resource. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--path | Specifies the path to the output file where the Composite Resource (XR) or Composite Resource Claim (XRC) will be saved. | |
--output | -o | Specifies the output format for the results. Use 'file' to save to a file, 'yaml' to display the Composite Resource (XR) or Composite Resource Claim (XRC) in YAML format, or 'json' to display in JSON format. |
--type | Specifies the type of resource to create: 'xrc' for Composite Resource Claim (XRC), 'xr' for Composite Resource (XR). | |
--scope | Specifies the XR scope (v2 only). | |
--api-group | Specifies the API group for the resource. | |
--api-version | Specifies the API version for the resource. | |
--kind | Specifies the Kind of the resource. | |
--name | Specifies the Name of the resource. | |
--namespace | Specifies the Namespace of the resource. | |
--project-file | -f | Path to project definition file. |
up function
Manage Functions.
Usage
up function <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up function generate
Generate an Function for a Composition.
The generate command creates an embedded function in the specified language,
and optionally adds it to a composition or operation pipeline.
Examples
Create a function with the default language (go-templating) in the folder
functions/fn1:
up function generate fn1
Create a Python function in the folder functions/fn2:
up function generate fn2 --language python
Create a KCL function in the folder functions/compose-xcluster and add it as a
composition pipeline step in the given composition file:
up function generate compose-xcluster apis/xcluster/composition.yaml --language kcl
Creates a Go function in the folder functions/check-pod-logs and add it as a
pipeline step to the operation in operations/watch-pods/operation.yaml:
up function generate check-pod-logs operations/watch-pods/operation.yaml --language go
Usage
up function generate <name> [<pipeline-path>] [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name for the new Function. |
<pipeline-path> | Optional Path to a composition or operation that will use the new function. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--project-file | -f | Path to project definition file. |
--repository | Repository for the built package. Overrides the repository specified in the project file. | |
--cache-dir | Directory used for caching dependency images. | |
--language | -l | Language for function. |
up group
Interact with groups inside Spaces.
The group command interacts with groups within the current Space. Use the up profile command to switch between different Upbound profiles and the up ctx
command to switch between Spaces within a Cloud profile.
Examples
List all groups in the current Space:
up group list
Create a new group named my-group to organize control planes within a Space:
up group create my-group
Get details about a specific group called my-group, including configuration
and metadata:
up group get my-group
Delete the group called my-group, which must not be protected:
up group delete my-group
Usage
up group <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up group create
Create a group.
Usage
up group create <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of group. |
up group delete
Delete a group.
Usage
up group delete <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of group. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--force | Force the deletion of the group. |
up group get
Get a group.
Usage
up group get <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of group. |
up group list
List groups in the space.
Usage
up group list [flags]
up help
Show help.
Usage
up help [flags]
up license
Show license information.
Usage
up license [flags]
up login
Login to Upbound. Will attempt to launch a web browser by default. Use --username and --password flags for automations.
The login command authenticates with Upbound Cloud and stores session
credentials.
Authentication Methods
- Web Browser (default) - Opens browser for OAuth authentication
- Device Code - Use --use-device-code for headless environments
- Username/Password - Provide --username and --password flags
- Personal Access Token or Robot Token - Provide --token flag
The command creates or updates a profile with the authenticated session. If no
profile name is specified, it uses the currently active profile. A profile named
default will be created if no profiles exist.
Examples
Open a browser for OAuth authentication (recommended):
up login
Prompt for password and authenticate with credentials:
up login --username=user@example.com
Authenticate using a personal access token.
up login --token=upat_xxxxx
Use the device code flow for headless/remote environments:
up login --use-device-code
Authenticate and create or update the production profile:
up login --profile=production --organization=my-org
Usage
up login [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. | |
--username | -u | Username used to execute command. |
--password | -p | Password for specified user. '-' to read from stdin. |
--token | -t | Upbound API token (personal access token) used to execute command. '-' to read from stdin. |
--use-device-code | Use authentication flow based on device code. We will also use this if it can't launch a browser in your behalf, e.g. in remote SSH |
up logout
Logout of Upbound.
The logout command invalidates the current session and removes stored
credentials.
This command:
- Invalidates the session token with Upbound Cloud
- Removes the session token from the local profile configuration
- Keeps the profile configuration intact (only removes authentication)
Note that this affects only a single profile. Other profiles remain authenticated.
After logout, you can log back in using up login to re-authenticate with the
same profile.
Examples
Log out the active profile:
up logout
Log out the production profile:
up logout --profile=production
Usage
up logout [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up operation
Manage Operations.
Usage
up operation <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up operation generate
Generate an Operation.
The generate command creates a new, empty operation.
Examples
Generates a new, empty, one-shot operation named my-operation:
up operation generate my-operation
Generate a new, empty cron operation named my-operation that runs every hour:
up operation generate my-operation --cron "0 0 * * *"
Generate a new, empty watch operation named my-operation triggered by changes
to Deployments in the namespace my-namespace:
up operation generate my-operation --watch-group-version-kind "apps/v1/Deployment" \
--watch-namespace "my-namespace"
Generate a new operation named claude-pod-watcher that invokes a Claude prompt
when pods in the default namespace change:
up operation generate claude-pod-watcher --watch-group-version-kind "apps/v1/Pod" \
--watch-namespace "default" --functions xpkg.upbound.io/upbound/function-claude
Usage
up operation generate <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name for the new operation. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--path | Optional path to the output file where the generated Operation will be saved. | |
--project-file | -f | Path to project definition file. |
--output | -o | Output format for the results: 'file' to save to a file, 'yaml' to print the Operation in YAML format, 'json' to print the operation in JSON format. |
--cache-dir | Directory used for caching dependency images. | |
--cron | Cron schedule for the operation. | |
--watch-labels | Labels to match on the resource. | |
--watch-group-version-kind | The GVK of resources to watch. For example, 'apps/v1/Deployment'. | |
--watch-namespace | The namespace in which to watch resources. | |
--functions | Comma-separated list of functions to call in the generated operation's pipeline. |
up operation render
Render an Operation.
The render command shows you what resources an Operation would create or mutate
by printing them to stdout. It also prints any changes that would be made to the
status of the Operation. It doesn't talk to Crossplane. Instead it runs the Operation
Function pipeline specified by the Operation locally, and uses that to render
the Operation.
Examples
Render an Operation:
up operation render operations/op1/operation.yaml
Pass context values to the Function pipeline:
up operation render operations/op1/operation.yaml \
--context-values=apiextensions.crossplane.io/environment='{"key": "value"}'
Pass required resources requested by functions in the pipeline:
up operation render operations/op1/operation.yaml \
--required-resources=required-resources.yaml
Pass credentials needed by functions in the pipeline:
up operation render operations/op1/operation.yaml \
--function-credentials=credentials.yaml
Include function results and context in the output:
up operation render operations/op1/operation.yaml -f -c
Include the full Operation with original spec and metadata:
up operation render operations/op1/operation.yaml -o
Docker Configuration
The render command uses Docker (or any Docker-compatible container runtime) to run operation functions. Configure the Docker connection using these standard environment variables:
DOCKER_HOST: Docker daemon socket (e.g.,unix:///var/run/docker.sock)DOCKER_API_VERSION: Docker API version to useDOCKER_CERT_PATH: Path to Docker TLS certificatesDOCKER_TLS_VERIFY: Enable TLS verification (1 or 0)
Usage
up operation render <operation> [flags]
Arguments
| Argument | Description |
|---|---|
<operation> | A YAML file specifying the Operation to render. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--required-resources | -r | A YAML file or directory of YAML files specifying required resources that functions can request. |
--context-files | Comma-separated context key-value pairs to pass to the Function pipeline. Values must be files containing JSON. | |
--context-values | Comma-separated context key-value pairs to pass to the Function pipeline. Values must be JSON. Keys take precedence over --context-files. | |
--include-function-results | -f | Include informational and warning messages from Functions in the rendered output as resources of kind: Result. |
--include-full-operation | -o | Include the full Operation with original spec and metadata in the rendered output. |
--include-context | -c | Include the context in the rendered output as a resource of kind: Context. |
--function-credentials | A YAML file or directory of YAML files specifying credentials to use for Functions to render the Operation. | |
--timeout | How long to run before timing out. | |
--max-concurrency | Maximum number of functions to build at once. | |
--project-file | -p | Path to project definition file. |
--cache-dir | Directory used for caching dependency images. | |
--no-build-cache | Don't cache image layers while building. | |
--build-cache-dir | Path to the build cache directory. |
up organization
Interact with Upbound organizations.
Usage
up organization <command> [flags]
Flags
| Flag | Short Form | Description |
|---|---|---|
--domain | Root Upbound domain. Overrides the current profile's domain. | |
--profile | Profile used to execute command. | |
--account | -a | Deprecated. Use organization instead. |
--organization | Organization used to execute command. Overrides the current profile's organization. | |
--ca-bundle | Path to CA bundle file to prepend to existing CAs | |
--insecure-skip-tls-verify | [INSECURE] Skip verifying TLS certificates. | |
--debug | -d | [INSECURE] Run with debug logging. Repeat to increase verbosity. Output might contain confidential data like tokens. |
--override-api-endpoint | Overrides the default API endpoint. | |
--override-auth-endpoint | Overrides the default auth endpoint. | |
--override-proxy-endpoint | Overrides the default proxy endpoint. | |
--override-registry-endpoint | Overrides the default registry endpoint. | |
--override-accounts-endpoint | Overrides the default accounts endpoint. | |
--kubeconfig | Override default kubeconfig path. | |
--kubecontext | Override default kubeconfig context. |
up organization create
Create an organization.
Usage
up organization create <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of organization. |
up organization delete
Delete an organization.
Usage
up organization delete <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of organization. |
Flags
| Flag | Short Form | Description |
|---|---|---|
--force | Force deletion of the organization. |
up organization get
Get an organization.
Usage
up organization get <name> [flags]
Arguments
| Argument | Description |
|---|---|
<name> | Name of organization. |
up organization list
List organizations.
Usage
up organization list [flags]
up organization token
Generates an organization-scoped token to authenticate with a Cloud space.
Usage
up organization token <name> [flags]