Installing Calico on Kubernetes
We provide a number of manifests to get you up and running with Calico in just a few steps. Refer to the section that corresponds to your desired networking for instructions.
After installing Calico, you can enable application layer policy. Enabling application layer policy also secures workload-to-workload communications with mutual TLS authentication.
Should you wish to modify the manifests before applying them, refer to Customizing the manifests.
If you prefer not to use Kubernetes to start the Calico services, refer to the Integration guide.
Several third-party vendors also provide tools to install Kubernetes with Calico in a variety of environments.
|ACS Engine||Deploys Kubernetes clusters on Azure with an option to enable Calico policy.|
|Google Container Engine||A managed Kubernetes environment by Google using Calico for network policy.|
|Heptio AWS Quickstart||Uses kubeadm and CloudFormation to build Kubernetes clusters on AWS using Calico for networking and network policy enforcement.|
|IBM Cloud Kubernetes Service||A managed Kubernetes environment by IBM using Calico for networking and network policy enforcement.|
|Kops||A popular Kubernetes project for launching production-ready clusters on AWS, as well as other public and private cloud environments.|
|Kubernetes kube-up||Deploys Calico on GCE using the same underlying open-source infrastructure as Google’s GKE platform.|
|Kubespray||A Kubernetes project for deploying Kubernetes with Ansible|
|StackPointCloud||Deploys a Kubernetes cluster with Calico to AWS in 3 steps using a web-based interface.|
|Typhoon||Deploys free and minimal Kubernetes clusters with Terraform.|