Ubuntu

These instructions will take you through a first-time install of Calico. If you are upgrading an existing system, please see Upgrading Calico on OpenStack instead.

There are two sections to the install: adding Calico to OpenStack control nodes, and adding Calico to OpenStack compute nodes. Follow the Common steps on each node before moving on to the specific instructions in the control and compute sections. If you want to create a combined control and compute node, work through all three sections.

Before you begin

Common steps

Some steps need to be taken on all machines being installed with Calico. These steps are detailed in this section.

  1. Configure APT to use the Calico PPA:

    1. add-apt-repository ppa:project-calico/calico-3.28
  2. Add the official BIRD PPA. This PPA contains fixes to BIRD that are not yet available in Ubuntu. To add the PPA, run:

    1. add-apt-repository ppa:cz.nic-labs/bird

    Ubuntu - 图1tip

    If the above command fails with error 'ascii' codec can't decode byte, try running the command with a UTF-8 enabled locale: LC_ALL=en_US.UTF-8 add-apt-repository ppa:cz.nic-labs/bird.

  3. Update your package manager on each machine:

    1. apt-get update
  4. Install version 1.0.1 of the etcd3gw Python package. This is needed by Calico’s OpenStack driver and DHCP agent.

    1. apt-get install -y python3-pip
    2. pip3 install etcd3gw==1.0.1
  5. Edit /etc/neutron/neutron.conf. Add a [calico] section with the following content, where <ip> is the IP address of the etcd server.

    1. [calico]
    2. etcd_host = <ip>

Control node install

On each control node, perform the following steps.

  1. Delete all configured OpenStack state, in particular any instances, routers, subnets and networks (in that order) created by the install process referenced above. You can do this using the web dashboard or at the command line.

    Ubuntu - 图2tip

    The Admin and Project sections of the web dashboard both have subsections for networks and routers. Some networks may need to be deleted from the Admin section.

    Ubuntu - 图3caution

    The Calico install will fail if incompatible state is left around.

  2. Run apt-get upgrade and apt-get dist-upgrade. These commands bring in Calico-specific updates to the OpenStack packages and to dnsmasq.

  3. Edit /etc/neutron/neutron.conf. In the [DEFAULT] section, find the line beginning with core_plugin, and change it to read core_plugin = calico. Also remove any existing setting for service_plugins.

  4. Install the calico-control package:

    1. apt-get install -y calico-control
  5. Restart the Neutron server process:

    1. service neutron-server restart

Compute node install

On each compute node, perform the following steps:

  1. Open /etc/nova/nova.conf and remove the line from the [DEFAULT] section that reads:

    1. linuxnet_interface_driver = nova.network.linux_net.LinuxOVSInterfaceDriver

    Remove the lines from the [neutron] section setting service_neutron_metadata_proxy or service_metadata_proxy to True, if there are any.

    Restart nova compute.

    1. service nova-compute restart
  2. If they’re running, stop the Open vSwitch services:

    1. service openvswitch-switch stop
    2. service neutron-plugin-openvswitch-agent stop

    Then, prevent the services running if you reboot:

    1. sh -c "echo 'manual' > /etc/init/openvswitch-switch.override"
    2. sh -c "echo 'manual' > /etc/init/openvswitch-force-reload-kmod.override"
    3. sh -c "echo 'manual' > /etc/init/neutron-plugin-openvswitch-agent.override"

    Then, on your control node, run the following command to find the agents that you just stopped:

    1. neutron agent-list

    For each agent, delete them with the following command on your control node, replacing <agent-id> with the ID of the agent:

    1. neutron agent-delete <agent-id>
  3. Install some extra packages:

    1. apt-get install -y neutron-common neutron-dhcp-agent nova-api-metadata
  4. Run apt-get upgrade and apt-get dist-upgrade. These commands bring in Calico-specific updates to the OpenStack packages and to dnsmasq.

  5. Edit /etc/neutron/neutron.conf. In the [oslo_concurrency] section, ensure that the lock_path variable is uncommented and set as follows.

    1. # Directory to use for lock files. For security, the specified directory should
    2. # only be writable by the user running the processes that need locking.
    3. # Defaults to environment variable OSLO_LOCK_PATH. If external locks are used,
    4. # a lock path must be set.
    5. lock_path = $state_path/lock
  6. Install the Calico DHCP agent (which uses etcd, allowing it to scale to higher numbers of hosts) and disable the Neutron-provided one:

    1. service neutron-dhcp-agent stop
    2. echo manual | tee /etc/init/neutron-dhcp-agent.override
    3. apt-get install -y calico-dhcp-agent
  7. Install the calico-compute package:

    1. apt-get install -y calico-compute

    This step may prompt you to save your iptables rules to make them persistent on restart — hit yes.

  8. Configure BIRD. By default Calico assumes that you will deploy a route reflector to avoid the need for a full BGP mesh. To this end, it includes configuration scripts to prepare a BIRD config file with a single peering to the route reflector. If that’s correct for your network, you can run either or both of the following commands.

    1. For IPv4 connectivity between compute hosts:
    2. ```bash
    3. calico-gen-bird-conf.sh <compute_node_ip> <route_reflector_ip> <bgp_as_number>
    4. ```
    5. And/or for IPv6 connectivity between compute hosts:
    6. ```bash
    7. calico-gen-bird6-conf.sh <compute_node_ipv4> <compute_node_ipv6> <route_reflector_ipv6> <bgp_as_number>
    8. ```
    9. You will also need to [configure your route reflector to allow connections from the compute node as a route reflector client](/calico/latest/networking/configuring/bgp)

    .

    1. If you _are_ configuring a full BGP mesh you need to handle the BGP
    2. configuration appropriately on each compute host. The scripts above can be
    3. used to generate a sample configuration for BIRD, by replacing the
    4. `<route_reflector_ip>` with the IP of one other compute host -- this will
    5. generate the configuration for a single peer connection, which you can
    6. duplicate and update for each compute host in your mesh.
    7. To maintain connectivity between VMs if BIRD crashes or is upgraded,
    8. configure BIRD graceful restart:
    9. - Add `-R` to `BIRD_ARGS` in /etc/bird/envvars (you may need to
    10. uncomment this option).
    11. - Edit the upstart jobs /etc/init/bird.conf and bird6.conf (if
    12. you're using IPv6), and add the following script to it.
    13. ```bash
    14. pre-stop script
    15. PID=`status bird | egrep -oi '([0-9]+)$' | head -n1`
    16. kill -9 $PID
    17. end script

    ```

  9. Create /etc/calico/felix.cfg with the following content, where <ip> is the IP address of the etcd server.

    1. [global]
    2. DatastoreType = etcdv3
    3. EtcdAddr = <ip>:2379
  10. Restart the Felix service.

    1. service calico-felix restart

Configuration for etcd authentication

If your etcd cluster has authentication enabled, you must also configure the relevant Calico components with an etcd user name and password. You can create a single etcd user for Calico that has permission to read and write any key beginning with /calico/, or you can create specific etcd users for each component, with more precise permissions.

This table sets out where to configure each component of Calico for OpenStack, and the detailed access permissions that each component needs:

ComponentConfigurationAccess
FelixCALICO_ETCD_USERNAME and CALICO_ETCD_PASSWORD variables in Felix’s environment on each compute node.See here
Neutron driveretcd_username and etcd_password in [calico] section of /etc/neutron/neutron.conf on each control node.See here
DHCP agentetcd_username and etcd_password in [calico] section of /etc/neutron/neutron.conf on each compute node.See here