Configure dual stack or IPv6 only
Big picture
Configure Calico IP address allocation to use dual stack or IPv6 only for workload communications.
Value
Workload communication over IPv6 is increasingly desirable, as well as or instead of IPv4. Calico supports:
IPv4 only (default)
Each workload gets an IPv4 address, and can communicate over IPv4.
Dual stack
Each workload gets an IPv4 and an IPv6 address, and can communicate over IPv4 or IPv6.
IPv6 only
Each workload gets an IPv6 address, and can communicate over IPv6.
Before you begin
Calico requirements
- Calico IPAM
Kubernetes version requirements
- For dual stack, 1.16 and later
- For one IP stack at a time (IPv4 or IPv6), any Kubernetes version
Kubernetes IPv6 host requirements
- An IPv6 address that is reachable from the other hosts
- The sysctl setting,
net.ipv6.conf.all.forwarding
, is set to1
. This ensures both Kubernetes service traffic and Calico traffic is forwarded appropriately. - A default IPv6 route
Kubernetes IPv4 host requirements
- An IPv4 address that is reachable from the other hosts
- The sysctl setting,
net.ipv4.conf.all.forwarding
, is set to1
. This ensures both Kubernetes service traffic and Calico traffic is forwarded appropriately. - A default IPv4 route
How to
note
The following tasks are only for new clusters.
Enable IPv6 only
- Operator
- Manifest
To configure an IPv6-only cluster using the operator, edit your default Installation at install time to include a single IPv6 pool, and no IPv4 pools. For example:
apiVersion: operator.tigera.io/v1
kind: Installation
metadata:
name: default
spec:
calicoNetwork:
# Note: The ipPools section cannot be modified post-install.
ipPools:
- blockSize: 122
cidr: 2001::00/64
encapsulation: None
natOutgoing: Enabled
nodeSelector: all()
Set up a new Kubernetes cluster with an IPv6 pod CIDR and service IP range.
Using the Calico Kubernetes install guide, download the correct Calico manifest for the cluster and datastore type.
Edit the CNI config (calico-config ConfigMap in the manifest) to disable IPv4 assignments and enable IPv6 assignments.
"ipam": {
"type": "calico-ipam",
"assign_ipv4": "false",
"assign_ipv6": "true"
},
Configure IPv6 support by adding the following variable settings to the environment for the
calico-node
container:Variable name Value IP6
autodetect
FELIX_IPV6SUPPORT
true
note
If your IPv6 IP pools include private IP addresses, pods that are assigned private IP addresses cannot perform outbound NAT by default.
To enable outbound NAT for these pods, add
CALICO_IPV6POOL_NAT_OUTGOING: true
to the environment of thecalico-node
container.For clusters not provisioned with kubeadm (see note below), configure the default IPv6 IP pool by adding the following variable setting to the environment for the
calico-node
container:Variable name Value CALICO_IPV6POOL_CIDR
the same as the IPv6 range you configured as the cluster CIDR to kube-controller-manager and kube-proxy note
For clusters provisioned with kubeadm, Calico autodetects the IPv4 and IPv6 pod CIDRs and does not require configuration.
Apply the edited manifest with
kubectl apply -f
.New pods will get IPv6 addresses, and can communicate with each other and the outside world over IPv6.
(Optional) Update host to not look for IPv4 addresses
If you want your workloads to have IPv6 addresses only, because you do not have IPv4 addresses or connectivity between your nodes, complete these additional steps to tell Calico not to look for any IPv4 addresses.
- Disable IP autodetection of IPv4 by setting
IP
tonone
. - Calculate the Calico BGP router ID for IPv6 using either of the following methods.
- Set the environment variable
CALICO_ROUTER_ID=hash
on calico/node. This configures Calico to calculate the router ID based on the hostname. - Pass a unique value for
CALICO_ROUTER_ID
to each node individually.
- Set the environment variable
Enable dual stack
- Set up a new cluster following the Kubernetes prerequisites and enablement steps.
- Operator
- Manifest
To configure dual-stack cluster using the operator, edit your default Installation at install time to include both an IPv4 and IPv6 pool. For example:
apiVersion: operator.tigera.io/v1
kind: Installation
metadata:
name: default
spec:
# Configures Calico networking.
calicoNetwork:
# Note: The ipPools section cannot be modified post-install.
ipPools:
- blockSize: 26
cidr: 10.48.0.0/21
encapsulation: IPIP
natOutgoing: Enabled
nodeSelector: all()
- blockSize: 122
cidr: 2001::00/64
encapsulation: None
natOutgoing: Enabled
nodeSelector: all()
Using the Calico Kubernetes install guide, download the correct Calico manifest for the cluster and datastore type.
Edit the CNI config (
calico-config
ConfigMap in the manifest), and enable IPv4 and IPv6 address allocation by setting both fields to true."ipam": {
"type": "calico-ipam",
"assign_ipv4": "true",
"assign_ipv6": "true"
},
Configure IPv6 support by adding the following variable settings to the environment for the
calico-node
container:Variable name Value IP6
autodetect
FELIX_IPV6SUPPORT
true
note
If your IPv6 IP pools include private IP addresses, pods that are assigned private IP addresses cannot perform outbound NAT by default.
To enable outbound NAT for these pods, add
CALICO_IPV6POOL_NAT_OUTGOING: true
to the environment of thecalico-node
container.For clusters not provisioned with kubeadm (see note below), configure the default IPv6 IP pool by adding the following variable setting to the environment for the
calico-node
container:Variable name Value CALICO_IPV6POOL_CIDR
the same as the IPv6 range you configured as the IPv6 cluster CIDR to kube-controller-manager and kube-proxy note
For clusters provisioned with kubeadm, Calico autodetects the IPv4 and IPv6 pod CIDRs and does not require configuration.
Apply the edited manifest with
kubectl apply -f
.New pods will get both IPv4 and IPv6 addresses, and can communicate with each other and the outside world over IPv4 or IPv6.