This repository is a curated collection of solutions designed to deploy and manage infrastructure and other applications on Crusoe Cloud.
These solutions are built for Crusoe Cloud, and will require you to install some (or all) of the following tools:
- Terraform (and the Terraform Provider for Crusoe)
- Crusoe CLI
Each solution README will also list its own specific prerequisites.
The langchain-crusoe package integrates Crusoe's Managed Inference service with the LangChain ecosystem. It provides a ChatCrusoe class that wraps Crusoe's OpenAI-compatible API, giving you access to leading open-source models — including Llama 3.3, DeepSeek V3/R1, Qwen3, Gemma 3, and Kimi-K2 — through a standard LangChain interface.
Key capabilities:
- Drop-in LangChain integration via
BaseChatOpenAI— streaming, async, tool calling, and structured output work out of the box - LangSmith tracing with
ls_provider="crusoe"for built-in observability - Project attribution via
CRUSOE_PROJECT_IDheader for multi-tenant usage tracking - Flexible configuration — API key, base URL, and project ID all configurable via environment variables
pip install langchain-crusoefrom langchain_crusoe import ChatCrusoe
llm = ChatCrusoe(model="meta-llama/Llama-3.3-70B-Instruct")
response = llm.invoke("Explain MemoryAlloy inference technology in one paragraph.")See the langchain-crusoe README for full setup instructions and usage examples.
This solution will install all the necessary drivers, packages and configurations to enable your Crusoe Cloud VMs to mount Crusoe Shared Volumes via NFS.
OCI Registry Cache for Google Artifact Registry
This is a working solution of an OCI Image registry, on Kubernetes, that acts as a cache for an upstream Google Artifact Registry.
Crusoe Cloud GPU VMs are equipped with high-performance NVIDIA Mellanox InfiniBand (IB) networking. This solution will set up your VMs with necessary configurations to use the pre-loaded NCCL all_reduce test on your VMs and test InfiniBand networking performance.
Crusoe Managed Kubernetes logs to Google Cloud Logging
For your applications running on Crusoe Managed Kubernetes cluster, you can collect, filter and ship logs using Fluent Bit to send to a centralized location. This solution provides a set of Kubernetes manifest files needed to configure those logs to be sent to Google Cloud Logging using Fluent Bit.
Crusoe to Splunk HEC Log Forwarder
Crusoe Cloud provides a 90-day history of who did what in your cloud, when, where, and with what result - also called Crusoe Audit Logs. This solution provides a sample Python tool to fetch those logs and forward them to a Splunk HTTP Event Collector (HEC).
