Calico provides a highly scalable networking solution for connecting data center workloads (containers, VMs, or bare metal). It is based on the same scalable IP networking principles as the internet: providing connectivity using a pure Layer 3 approach. Calico can be deployed without encapsulation or overlays to provide high performance at massive scales.
Read more about it on the Project Calico website.
When using Calico networking in containerized environments, each container
gets its own IP and fine grain security policy. A calico-node
service runs
on each node which handles all of the necessary IP routing, installation of
policy rules, and distribution of routes across the cluster of nodes.
This repository contains:
- The
calico/node
container Dockerfile and build environment. It contains the configuration and "glue" that pull together four separate processes to provide Calico networking:
- Felix, the Calico worker process
- BIRD, the route distribution process (there are separate processes for IPv4 and IPv6)
- Confd, a templating process to auto-generate configuration for BIRD
- A command line tool,
calicoctl
, which makes it easy to configure and start the Calico service listed above, and allows you to interact with the datastore (etcd) to define and apply rich security policy to the containers you create. - Build, test and release frameworks.
For more information on deploying and using calico, see Calico Documentation.
We welcome questions/comments/feedback (and pull requests).
- Slack Calico Users Channel
- Announcement Mailing List
- Technical Mailing List
- IRC - #calico
- For issues related to Calico in a containerized environment, please raise issues on GitHub.
If you are interested in contributing, please review our contributing guidelines.