Skip to main content
Version: 3.27 (latest)

Self-managed Kubernetes in Google Compute Engine (GCE)

Big picture

Use Calico with a self-managed Kubernetes cluster in Google Compute Engine (GCE).

Value

Managing your own Kubernetes cluster (as opposed to using a managed-Kubernetes service like GKE) gives you the most flexibility in configuring Calico and Kubernetes. Calico combines flexible networking capabilities with "run-anywhere" security enforcement to provide a solution with native Linux kernel performance and true cloud-native scalability.

Concepts

kubeadm is a cluster management tool that is used to install Kubernetes.

Before you begin...

Install and configure the Google Cloud CLI tools

How to

There are many ways to install and manage Kubernetes in GCE. Using kubeadm is a good default choice for most people, as it gives you access to all of Calico’s flexible and powerful networking features. However, there are other options that may work better for your environment.

kubeadm for Calico networking and network policy

Create cloud resources

You will need at least one VM to serve as a control plane node and one or more worker nodes. (It is possible to have control plane nodes also act as workers. This is not recommended in most cases and not covered by this guide.) See requirements for specific OS requirements for these VMs.

The following worked example creates a single control node and three workers on a dedicated virtual private network (VPC). Adjust the example as needed for your requirements. Consider a dedicated infrastructure management tool like Terraform for managing cloud resources. (This example is adapted from Kubernetes the Hard Way.)

  1. Create the VPC.

    gcloud compute networks create example-k8s --subnet-mode custom
  2. Create the k8s-nodes subnet in the example-k8s VPC network:

    gcloud compute networks subnets create k8s-nodes \
    --network example-k8s \
    --range 10.240.0.0/24
  3. Create a firewall rule that allows internal communication across TCP, UDP, ICMP and IP in IP (used for the Calico overlay):

    gcloud compute firewall-rules create example-k8s-allow-internal \
    --allow tcp,udp,icmp,ipip \
    --network example-k8s \
    --source-ranges 10.240.0.0/24
  4. Create a firewall rule that allows external SSH, ICMP, and HTTPS:

    gcloud compute firewall-rules create example-k8s-allow-external \
    --allow tcp:22,tcp:6443,icmp \
    --network example-k8s \
    --source-ranges 0.0.0.0/0
  5. Create the controller VM.

    gcloud compute instances create controller \
    --async \
    --boot-disk-size 200GB \
    --can-ip-forward \
    --image-family ubuntu-2204-lts \
    --image-project ubuntu-os-cloud \
    --machine-type n1-standard-2 \
    --private-network-ip 10.240.0.11 \
    --scopes compute-rw,storage-ro,service-management,service-control,logging-write,monitoring \
    --subnet k8s-nodes \
    --zone us-central1-f \
    --tags example-k8s,controller
  6. Create three worker VMs.

    for i in 0 1 2; do
    gcloud compute instances create worker-${i} \
    --async \
    --boot-disk-size 200GB \
    --can-ip-forward \
    --image-family ubuntu-2204-lts \
    --image-project ubuntu-os-cloud \
    --machine-type n1-standard-2 \
    --private-network-ip 10.240.0.2${i} \
    --scopes compute-rw,storage-ro,service-management,service-control,logging-write,monitoring \
    --subnet k8s-nodes \
    --zone us-central1-f \
    --tags example-k8s,worker
    done
  7. Install Docker on the controller VM and each worker VM. On each VM run:

    sudo apt update
    sudo apt install -y docker.io
    sudo systemctl enable docker.service
    sudo apt install -y apt-transport-https curl

Install Kubernetes and create the cluster

  1. Install kubeadm, kubelet, and kubectl on each worker node and the controller node (see kubeadm docs for more details).

    Connect to each node and run these commands:

    curl -fsSL https://dl.k8s.io/apt/doc/apt-key.gpg | sudo apt-key add -
    cat <<EOF | sudo tee /etc/apt/sources.list.d/kubernetes.list
    deb https://pkgs.k8s.io/ kubernetes-xenial main
    EOF
    sudo apt-get update
    sudo apt-get install -y kubelet kubeadm kubectl
    sudo apt-mark hold kubelet kubeadm kubectl
  2. Create the controller node of a new cluster.

    Connect to the controller VM, and run the following command:

    sudo kubeadm init --pod-network-cidr 192.168.0.0/16
    note

    The final line of the kubeadm init output contains the command for joining your workers to the controller. Make a note of the command, which needs to be used in a later step.

    The command looks something similar to this:

    kubeadm join 10.240.0.11:6443 --token ar77y2.7274jxuumt8vhhvw \
    --discovery-token-ca-cert-hash sha256:d913182b646660c7be5bd76c1b9e9fa3e613ed9c18ef36ad0d475f8f7c887331
  3. Set up kubectl for the Ubuntu user.

    Connect to the controller VM, and run the following commands:

    mkdir -p $HOME/.kube
    sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
    sudo chown $(id -u):$(id -g) $HOME/.kube/config
  4. Join your worker nodes to the controller node.

    note

    Use the command that you copied in the earlier step.

    Run this on each worker, prepending sudo to run it as root. It will look something like this:

    sudo kubeadm join 10.240.0.11:6443 --token <token> --discovery-token-ca-cert-hash sha256:<hash>
  5. Verify that all nodes have joined.

    Run this command on the controller node.

    kubectl get nodes

which should output something similar to:

NAME         STATUS     ROLES    AGE     VERSION
controller NotReady master 5m49s v1.17.2
worker-0 NotReady <none> 3m38s v1.17.2
worker-1 NotReady <none> 3m7s v1.17.2
worker-2 NotReady <none> 5s v1.17.2

Install Calico

  1. On the controller, install Calico using the operator:

    kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.27.2/manifests/tigera-operator.yaml
  2. Download the custom resources necessary to configure Calico

    curl https://raw.githubusercontent.com/projectcalico/calico/v3.27.2/manifests/custom-resources.yaml -O
  3. If you wish to customize the Calico install, customize the downloaded custom-resources.yaml manifest. Then create the manifest to install Calico.

    kubectl create -f custom-resources.yaml

The geeky details of what you get:

PolicyIPAMCNIOverlayRoutingDatastore

Other tools and options

Terraform

You may have noticed that the bulk of the above instructions are about provisioning the Google Cloud resources for the cluster and installing Kubernetes. Terraform is a tool for automating infrastructure provisioning using declarative configurations. You can also go as far as automating the install of Docker, kubeadm, and Kubernetes using Terraform “provisioners.” See the Terraform documentation for more details.

Kubespray

Kubespray is a tool for provisioning and managing Kubernetes clusters with support for multiple clouds including Google Compute Engine. Calico is the default networking provider, or you can set the kube_network_plugin variable to calico. See the Kubespray docs for more details. See the Kubespray docs for more details.

Next steps

Required

Recommended