Installing Calico for policy and flannel for networking

Before you begin

Ensure that you have a Kubernetes cluster that meets the Calico system requirements. If you don’t, follow the steps in Using kubeadm to create a cluster.

Installing Calico for policy and flannel for networking

Selecting a datastore type

The procedure differs according to your datastore type. Refer to the section that matches your type.

  1. Ensure that the Kubernetes controller manager has the following flags set:
    --cluster-cidr=10.244.0.0/16 and --allocate-node-cidrs=true.

    Tip: If you’re using kubeadm, you can pass --pod-network-cidr=10.244.0.0/16 to kubeadm to set the Kubernetes controller flags.

  2. If your cluster has RBAC enabled, issue the following command to configure the roles and bindings that Calico requires.

    kubectl apply -f \
    https://just-master--zealous-perlman-827aaa.netlify.com/master/getting-started/kubernetes/installation/hosted/canal/rbac.yaml
    

    Note: You can also view the manifest in your browser.

  3. Issue the following command to install Calico.

    kubectl apply -f \
    https://just-master--zealous-perlman-827aaa.netlify.com/master/getting-started/kubernetes/installation/hosted/canal/canal.yaml
    

    Note: You can also view the manifest in your browser.

  4. If you wish to enforce application layer policies and secure workload-to-workload communications with mutual TLS authentication, continue to Enabling application layer policy (optional).

Installing with the etcd datastore

We strongly recommend using the Kubernetes API datastore, but if you prefer to use etcd, complete the following steps.

  1. If your cluster has RBAC enabled, issue the following command to configure the roles and bindings that Calico requires.

    kubectl apply -f \
    https://just-master--zealous-perlman-827aaa.netlify.com/master/getting-started/kubernetes/installation/hosted/canal/rbac-etcd.yaml
    

    Note: You can also view the manifest in your browser.

  2. Download the Calico networking manifest for the Kubernetes API datastore.

    curl \
    https://just-master--zealous-perlman-827aaa.netlify.com/master/getting-started/kubernetes/installation/hosted/canal/canal-etcd.yaml \
    -O
    
  3. In the ConfigMap named calico-config, set the value of etcd_endpoints to the IP address and port of your etcd server.

    Tip: You can specify more than one using commas as delimiters.

  4. Apply the manifest using the following command.

    kubectl apply -f canal-etcd.yaml
    
  5. If you wish to enforce application layer policies and secure workload-to-workload communications with mutual TLS authentication, continue to Enabling application layer policy (optional).