Tanzu Kubernetes Grid (TKG)

2 MINUTE READ

Big picture

Install Calico Enterprise as the CNI for networking and/or network policy on Tanzu Kubernetes Grid for workload clusters.

Before you begin

Supported

  • All supported platforms in this release except Windows

Unsupported

  • ebpf

Required

AWS requirements

  • EC2 instances must be configured to belong to a separate SecurityGroup with ingress rules:
    • Calico (BGP) TCP 179
    • Calico (Typha) TCP 5473

Recommended

How to

The geeky details of what you get:

Policy
Calico
IPAM
Calico
CNI
Calico
Overlay
IPIP
Routing
BGP
Datastore
Kubernetes
?

Install Calico Enterprise

  1. Configure storage for Calico Enterprise.

  2. Install the Tigera operator and custom resource definitions.

    kubectl create -f https://docs.tigera.io/v3.11/manifests/tigera-operator.yaml
    
  3. Install the Prometheus operator and related custom resource definitions. The Prometheus operator will be used to deploy Prometheus server and Alertmanager to monitor Calico Enterprise metrics.

    Note: If you have an existing Prometheus operator in your cluster that you want to use, skip this step. To work with Calico Enterprise, your Prometheus operator must be v0.40.0 or higher.

    kubectl create -f https://docs.tigera.io/v3.11/manifests/tigera-prometheus-operator.yaml
    
  4. Install your pull secret.

    If pulling images directly from quay.io/tigera, you will likely want to use the credentials provided to you by your Tigera support representative. If using a private registry, use your private registry credentials.

    kubectl create secret generic tigera-pull-secret \
        --from-file=.dockerconfigjson=<path/to/pull/secret> \
        --type=kubernetes.io/dockerconfigjson -n tigera-operator
    
  5. (Optional) If your cluster architecture requires any custom Calico Enterprise resources to function at startup, install them now using calicoctl.

  6. Install the Tigera custom resources. For more information on configuration options available, see the installation reference.

    kubectl create -f https://docs.tigera.io/v3.11/manifests/custom-resources.yaml
    

    You can now monitor progress with the following command:

    watch kubectl get tigerastatus
    

    Wait until the apiserver shows a status of Available, then proceed to the next section.

Install Calico Enterprise license

Install the Calico Enterprise license provided to you by Tigera.

kubectl create -f </path/to/license.yaml>

You can now monitor progress with the following command:

watch kubectl get tigerastatus

When all components show a status of Available, continue to the next section.

Secure Calico Enterprise with network policy

Install the following network policies to secure Calico Enterprise component communications.

kubectl create -f https://docs.tigera.io/v3.11/manifests/tigera-policies.yaml

Next steps

Recommended

Recommended - Networking

Recommended - Security