mirror of https://github.com/kubernetes/kops.git
Some Calico doc updates
This commit is contained in:
parent
cd9e01cb03
commit
7c234cc431
|
@ -1,8 +1,26 @@
|
|||
# Calico
|
||||
[Calico](https://docs.projectcalico.org/latest/introduction/) is an open source networking and
|
||||
network security solution for containers, virtual machines, and native host-based workloads.
|
||||
|
||||
Calico combines flexible networking capabilities with run-anywhere security enforcement to provide
|
||||
a solution with native Linux kernel performance and true cloud-native scalability. Calico provides
|
||||
developers and cluster operators with a consistent experience and set of capabilities whether
|
||||
running in public cloud or on-prem, on a single node or across a multi-thousand node cluster.
|
||||
|
||||
See [Calico for networking and network policy](networking.md#calico-example-for-cni-and-network-policy) for help configuring kops with Calico.
|
||||
|
||||
For more general information on options available with Calico see the official [Calico docs](https://docs.projectcalico.org/latest/introduction/):
|
||||
* See [Calico Network Policy](https://docs.projectcalico.org/latest/security/calico-network-policy)
|
||||
for details on the additional features not available with Kubernetes Network Policy.
|
||||
* See [Determining best Calico networking option](https://docs.projectcalico.org/latest/networking/determine-best-networking)
|
||||
for help with the network options available with Calico.
|
||||
|
||||
# Calico Version 3
|
||||
In early 2018 Version 3 of Calico was released, it included a reworked data
|
||||
model and with that a switch from the etcd v2 to v3 API. This document covers
|
||||
model and with that a switch from the etcd v2 to v3 API. This section covers
|
||||
the requirements, upgrade process, and configuration to install
|
||||
Calico Version 3.
|
||||
Calico Version 3. By default new Kops installations configured to use Calico
|
||||
will install v3.
|
||||
|
||||
## Requirements
|
||||
|
||||
|
@ -45,7 +63,7 @@ a v3 version. Feel free to change to a different v3 version of etcd.
|
|||
|
||||
## Upgrading an existing cluster
|
||||
Assuming your cluster meets the requirements it is possible to upgrade
|
||||
your Calico Kops cluster.
|
||||
your Calico v2 Kops cluster to Calico v3.
|
||||
|
||||
A few notes about the upgrade:
|
||||
|
||||
|
|
|
@ -34,7 +34,7 @@ has built in support for CNI networking components.
|
|||
|
||||
Several different CNI providers are currently built into kops:
|
||||
|
||||
* [Calico](https://docs.projectcalico.org/v3.1/getting-started/kubernetes/installation/calico#installing-with-the-etcd-datastore)
|
||||
* [Calico](https://docs.projectcalico.org/latest/introduction) - use `--networking calico` (See [below](#calico-example-for-cni-and-network-policy) for additional configuration options.)
|
||||
* [Canal (Flannel + Calico)](https://github.com/projectcalico/canal)
|
||||
* [flannel](https://github.com/coreos/flannel) - use `--networking flannel-vxlan` (recommended) or `--networking flannel-udp` (legacy). `--networking flannel` now selects `flannel-vxlan`.
|
||||
* [kopeio-vxlan](https://github.com/kopeio/networking)
|
||||
|
@ -161,15 +161,13 @@ The above will deploy a daemonset installation which requires K8s 1.4.x or above
|
|||
|
||||
##### Enable Cross-Subnet mode in Calico (AWS only)
|
||||
|
||||
Calico [since 2.1] supports a new option for IP-in-IP mode where traffic is only encapsulated
|
||||
Calico [since 2.1](https://www.projectcalico.org/project-calico-2-1-released/) supports a new option for IP-in-IP mode where traffic is only encapsulated
|
||||
when it’s destined to subnets with intermediate infrastructure lacking Calico route awareness
|
||||
– for example, across heterogeneous public clouds or on AWS where traffic is crossing availability zones/ regions.
|
||||
|
||||
With this mode, IP-in-IP encapsulation is only performed selectively. This provides better performance in AWS
|
||||
multi-AZ deployments, and in general when deploying on networks where pools of nodes with L2 connectivity
|
||||
are connected via a router.
|
||||
|
||||
Reference: [Calico 2.1 Release Notes](https://www.projectcalico.org/project-calico-2-1-released/)
|
||||
With this mode, IP-in-IP encapsulation is only [performed selectively](https://docs.projectcalico.org/v3.10/networking/vxlan-ipip#configure-ip-in-ip-encapsulation-for-only-cross-subnet-traffic).
|
||||
This provides better performance in AWS multi-AZ deployments, and in general when deploying on networks where
|
||||
pools of nodes with L2 connectivity are connected via a router.
|
||||
|
||||
Note that Calico by default, routes between nodes within a subnet are distributed using a full node-to-node BGP mesh.
|
||||
Each node automatically sets up a BGP peering with every other node within the same L2 network.
|
||||
|
@ -210,7 +208,7 @@ Only the masters have the IAM policy (`ec2:*`) to allow k8s-ec2-srcdst to execut
|
|||
|
||||
For Calico specific documentation please visit the [Calico Docs](http://docs.projectcalico.org/latest/getting-started/kubernetes/).
|
||||
|
||||
For details on upgrading a Calico v2 deployment see [Calico Version 3](calico-v3.md).
|
||||
For details on upgrading a Calico v2 deployment see [Calico Version 3](calico-v3.md#upgrading-an-existing-cluster).
|
||||
|
||||
#### Getting help with Calico
|
||||
|
||||
|
|
Loading…
Reference in New Issue