Calico BIRD Route Reflector container
For many Calico deployments, the use of a Route Reflector is not required. However, for large scale deployments a full mesh of BGP peerings between each of your Calico nodes may become untenable. In this case, route reflectors allow you to remove the full mesh and scale up the size of the cluster.
This guide discusses the calico/routereflector image: a container image that
packages up the BIRD
BGP daemon along with the confd
templating engine to
provide a simple route reflector image which may be used for scaled-out Calico
deployments.
The image is currently experimental and has some key limitations discussed below. However, it may provide a useful framework for future development.
These instructions are focused on container-based deployments that use the
calico/node
container image.
For an OpenStack deployment, read Configuring BIRD as a BGP Route Reflector.
Note: The API and behavior of
calico/routereflector
is likely to change in future releases.
Known limitations
- The
calico/routereflector
instance will automatically peer with the Calico nodes, but it currently has no mechanism to configure peerings with non-Calico BGP speakers (e.g. edge routers) - There is no
calicoctl
integration or similar. - If you are using Kubernetes API as the Calico datastore, the Route Reflector container currently only supports running as a single-instance.
- For etcdv3, the Route Reflector container may be used to form a cluster of route reflectors that
automatically create a full mesh between each Route Reflector.
- Note that there is no
calicoctl
integration and to form a cluster it is necessary to configure data directly into theetcd
datastore for each Route Reflector instance. - It is not possible to form multiple separate meshed groups of Route Reflectors using this image.
- Note that there is no
Starting and configuring your route reflectors
Follow the appropriate section to start and configure your route reflectors depending on the datastore you are using for Calico:
Using etcdv3 as the Calico datastore
Starting a Route Reflector instance
On your Route Reflector host, ensure you have Docker v1.6 or greater installed.
Run the following command to start the Route Reflector container image.
docker run --privileged --net=host -d \
-e IP=<IPv4_RR> \
[-e IP6=<IPv6_RR>] \
-e ETCD_ENDPOINTS=<http://ETCD_IP:PORT> \
calico/routereflector:v0.6.3
Where:
[]
indicates an optional parameter<IPv4_RR>
is the IPv4 address of the RR host (the BIRD instance binds to the hosts IPv4 address)<IPv6_RR>
is the optional IPv6 address of the RR host (the BIRD6 instance binds to the hosts IPv6 address)<ETCD_IP:PORT>
is the colon separated IPv4 address and port of an etcd node in the etcd cluster. A comma-separated list of endpoints may be specified.
Note: If you require TLS/SSL-enabled etcd, see the section below for details on how to start the route reflector.
Route Reflector with TLS/SSL Etcd
If you are running secure etcd, you will need to pass in additional options and set environment variables for the certificate and key files associated with your etcd instance.
When starting the Route Reflector container image, you need to mount the certificate files and environment variable filepaths for each file:
docker run --privileged --net=host -d \
-e IP=<IPv4_RR> \
[-e IP6=<IPv6_RR>] \
-e ETCD_ENDPOINTS=<https://ETCD_IP:PORT> \
-v <FULL_PATH_TO_CERT_DIR>:<MOUNT_DIR> \
-e ETCD_CA_CERT_FILE=<MOUNT_DIR>/<CA_FILE> \
-e ETCD_CERT_FILE=<MOUNT_DIR>/<CERT_FILE> \
-e ETCD_KEY_FILE=<MOUNT_DIR>/<KEY_FILE> \
calico/routereflector:v0.6.3
Where <FULL_PATH_TO_CERT_DIR>
is a directory on the host that contains
the certificate files (you can mount multiple directories with additional
-v <DIR>
parameters if they are in separate directories, but be sure
to choose different <MOUNT_DIR>
locations if this is the case).
Using the Kubernetes API as the Calico datastore
If you are using Kubernetes as the datastore for Calico, the Calico Route Reflector container only supports running as a single route reflector. It is not possible with this image to set up a cluster of route reflectors.
Starting up the Route Reflector
On your Route Reflector host, ensure you have Docker v1.6 or greater installed.
You will need a kubeconfig file that you need to mount into the route reflector container.
Run the following command to start the Route Reflector container image.
docker run --privileged --net=host -d \
-e DATASTORE_TYPE=kubernetes \
-e KUBECONFIG=/kubeconfig \
-e IP=<IPv4_RR> \
-v <KUBECONFIG FILE PATH>:/kubeconfig \
calico/routereflector:v0.6.3
Where:
<IPv4_RR>
is the IPv4 address of the RR host (the BIRD instance binds to the hosts IPv4 address)<KUBECONFIG FILE PATH>
is the path to the kubeconfig file.
When using Kubernetes API as the datastore, this route reflector image only works as a single standalone reflector.
Configuring Calico to use the route reflectors
Run through this section to set up the global Calico configuration before configuring any nodes. This only needs to be done once.
- Disable the full node-to-node BGP mesh
- Configure the default node AS number for your network (this is used by the Route Reflector image when setting up the Route Reflector full mesh).
If you have a small cluster of Route Reflectors and you intend to have every Calico Docker node peer with every Route Reflector, set this up one time as global configuration.
Turn off the full node-to-node mesh
From any Calico Docker node, run the following:
# Get the current bgpconfig settings
$ calicoctl get bgpconfig -o yaml > bgp.yaml
# Set nodeToNodeMeshEnabled to false
$ vim bgp.yaml
# Replace the current bgpconfig settings
$ calicoctl replace -f bgp.yaml
Determine the AS number for your network
From any Calico Docker node, run the following:
calicoctl get nodes --output=wide
This returns table of all configured Calico node instances and includes the AS number for each node.
Peering with every Route Reflector (optional)
If you have a small cluster of Route Reflectors (e.g. a single RR or a pair of RRs for redundancy) and you intend to have every Calico Docker node peer with each of the Route Reflectors, you can set up the peerings as a one-time set of global configuration.
Use calicoctl
to configure each route reflector as a global peer (i.e. it
peers with every node in the deployment):
calicoctl bgp peer add <IP_RR> as <AS_NUM>
$ calicoctl create -f - << EOF
apiVersion: projectcalico.org/v3
kind: BGPPeer
metadata:
name: bgppeer-global
spec:
peerIP: <IP_RR>
asNumber: <AS_NUM>
EOF
Where:
<IP_RR>
is the IPv4 or IPv6 address of the Route Reflector.<AS_NUM>
is the AS number to use for the network (set or determined above).
Setting up node-specific peering
If you are deploying a cluster of Route Reflectors, with each Calico node peering to a subset of Route Reflectors it will be necessary to set up the peerings on a node-by-node basis.
This would be the typical situation when scaling out to a very large size. For example, you may have:
- a cluster of 100 route reflectors connected in a full mesh
- a network of 100,000 Calico Docker nodes
- each Calico Docker node is connected to two or three different Route Reflectors.
Configuring a node-specific Route Reflector peering
To configure a Route Reflector as a peer of a specific node, run the following from the node:
$ cat << EOF | calicoctl create -f -
apiVersion: projectcalico.org/v3
kind: BGPPeer
metadata:
name: bgppeer-2
spec:
peerIP: <IP_RR>
node: <NODENAME>
asNumber: <AS_NUM>
EOF
Where:
<IP_RR>
is the IPv4 or IPv6 address of the Route Reflector.<AS_NUM>
is the AS number to use for the network (set or determined above).<NODENAME>
is the name of the node.
Run this separately for each Route Reflector that you want to peer with the node.