This document describes how to install Calico on Kubernetes in a mode that does not require access to an etcd cluster.
This mode uses the Kubernetes API as the datastore.
Note that this feature currently comes with a number of limitations, namely:
- It does not yet support Calico IPAM. It is recommended to use
host-localIPAM in conjunction with Kubernetes pod CIDR assignments.
- It does not yet support the full set of
- It does not yet support the full set of calico/node options (such as IP autodiscovery).
- Calico networking support is in Beta and has limited configuration options:
- it only supports a full BGP node-to-node mesh
- it does not yet support BGP peer configuration.
The provided manifest configures Calico to use host-local IPAM in conjunction with the Kubernetes assigned pod CIDRs for each node.
You must have a cluster which meets the following requirements:
- You have a Kubernetes cluster configured to use CNI network plugins (i.e. by passing
--network-plugin=cnito the kubelet)
- Your Kubernetes controller manager is configured to allocate pod CIDRs (i.e. by passing
--allocate-node-cidrs=trueto the controller manager)
- Your Kubernetes controller manager has been provided a cluster-cidr (i.e. by passing
--cluster-cidr=192.168.0.0/16, which the manifest expects by default).
Note: If you are upgrading from Calico v2.1, the cluster-cidr selected for your controller manager should remain unchanged from the v2.1 install (the v2.1 manifests default to
This document describes three installation options for Calico using Kubernetes API as the datastore:
- Calico policy with Calico networking (beta)
- Calico policy-only with user-supplied networking
- Calico policy-only with flannel networking
Ensure you have a cluster which meets the above requirements. There may be additional requirements based on the installation option you choose.
Note: There is currently no upgrade path to switch between different installation options. Therefore, if you are upgrading from Calico v2.1, use the Calico policy-only with user-supplied networking installation instructions to upgrade Calico policy-only which leaves the networking solution unchanged.
1. Calico policy with Calico networking (Beta)
With Kubernetes as the Calico datastore, Calico has Beta support for Calico networking. This provides BGP-based networking with a full node-to-node mesh. It is not currently possible to configure the Calico BGP network to peer with other routers - future releases of Calico are expected to bring feature parity with the etcd-backed Calico.
To install Calico with Calico networking, run one of the following commands based on your Kubernetes version:
For Kubernetes 1.6+ clusters:
kubectl apply -f http://docs.projectcalico.org/master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/calico-networking/1.6/calico.yaml
For Kubernetes 1.5 clusters:
kubectl apply -f http://docs.projectcalico.org/master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/calico-networking/1.5/calico.yaml
Calico policy with Calico networking on kubeadm
The above manifests are compatible with kubeadm clusters initialized with a
pod-network-cidr matching the default pool of
192.168.0.0/16, as follows:
kubeadm init --pod-network-cidr=192.168.0.0/16
2. Calico policy-only with user-supplied networking
If you run Calico in policy-only mode it is necessary to configure your network to route pod traffic based on pod CIDR allocations, either through static routes, a Kubernetes cloud-provider integration, or flannel (self-installed).
To install Calico in policy-only mode, run one of the following commands based on your Kubernetes version:
For Kubernetes 1.6+ clusters:
kubectl apply -f http://docs.projectcalico.org/master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/policy-only/1.6/calico.yaml
For Kubernetes 1.5 clusters:
kubectl apply -f http://docs.projectcalico.org/master/getting-started/kubernetes/installation/hosted/kubernetes-datastore/policy-only/1.5/calico.yaml
3. Calico policy-only with flannel networking
The Canal project provides a way to easily deploy Calico with flannel networking.
Refer to the following Kubernetes self-hosted install guide in the Canal project for details on installing Calico with flannel.
If your Kubernetes cluster has RBAC enabled, you’ll need to create RBAC roles for Calico. Apply the following manifest to create these RBAC roles.
Note: The following RBAC policy is compatible with the Kubernetes v1.6+ manifest only.
kubectl apply -f http://docs.projectcalico.org/master/getting-started/kubernetes/installation/hosted/rbac.yaml
Once installed, you can try out NetworkPolicy by following the simple policy guide.
Below are a few examples for how to get started.
The following environment variable configuration options are supported by the various Calico components when running without etcd.
|DATASTORE_TYPE||Indicates the datastore to use||kubernetes|
|KUBECONFIG||When using the kubernetes datastore, the location of a kubeconfig file to use.||/path/to/kube/config|
|K8S_API_ENDPOINT||Location of the Kubernetes API. Not required if using kubeconfig.||https://kubernetes-api:443|
|K8S_CERT_FILE||Location of a client certificate for accessing the Kubernetes API.||/path/to/cert|
|K8S_KEY_FILE||Location of a client key for accessing the Kubernetes API.||/path/to/key|
|K8S_CA_FILE||Location of a CA for accessing the Kubernetes API.||/path/to/ca|
|K8S_TOKEN||Token to be used for accessing the Kubernetes API.|
An example using
$ export DATASTORE_TYPE=kubernetes $ export KUBECONFIG=~/.kube/config $ calicoctl get workloadendpoints HOSTNAME ORCHESTRATOR WORKLOAD NAME kubernetes-minion-group-tbmi k8s kube-system.kube-dns-v20-jhk10 eth0 kubernetes-minion-group-x7ce k8s kube-system.kubernetes-dashboard-v1.4.0-wtrtm eth0
How it works
Calico typically uses
etcd to store information about Kubernetes Pods, Namespaces, and NetworkPolicies. This information
is populated to etcd by the Calico CNI plugin and policy controller, and is interpreted by Felix and BIRD to program the dataplane on
each host in the cluster.
The above manifest deploys Calico such that Felix uses the Kubernetes API directly to learn the required information to enforce policy, removing Calico’s dependency on etcd and the need for the Calico kubernetes policy controller.
The Calico CNI plugin is still required to configure each pod’s virtual ethernet device and network namespace.