Operations
Post-installation tasks for managing Calico Enterprise.
Configuring the web console
Configure access to the web console
Expose the Calico Enterprise web console outside the cluster through ingress, a load balancer service, or port forwarding for administrator access.
Authentication quickstart
Sign in to the Calico Enterprise web console and Kibana with default service-account token authentication for a quick first-time setup.
Configure an external identity provider
Connect an external identity provider to Calico Enterprise so users authenticate against an existing IdP when signing in to the web console and Kibana.
Configure user roles and permissions
Configure Kubernetes RBAC roles and bindings to scope user access to Calico Enterprise features, tiered policies, observability views, and management plane APIs.
calicoctl and calicoq
Install calicoctl
Install the calicoctl command-line tool as a binary, container, or kubectl plugin so administrators can manage Calico Enterprise resources from any workstation.
Configure calicoctl
Overview reference for configuring calicoctl datastore access in Calico Enterprise, comparing config-file, environment-variable, and kubeconfig methods.
Configure calicoctl to connect to the datastore
Sample calicoctl configuration for connecting to the Kubernetes API datastore in a Calico Enterprise cluster, with kubeconfig credential settings.
Install calicoq
Install the calicoq command-line tool as a binary or container on any host with network access to the Calico Enterprise datastore.
Configure calicoq
Overview reference for configuring calicoq datastore access in Calico Enterprise, covering config files, environment variables, and Kubernetes credentials.
Configure calicoq to connect to the datastore
Sample calicoq configuration for connecting to the Kubernetes API datastore in a Calico Enterprise cluster, with kubeconfig credential settings.
Securing component communications
Configure encryption and authentication to secure Calico Enterprise components
Configure TLS authentication and encryption across Calico Enterprise components, the Kubernetes control plane, Typha, Node, and shared observability traffic.
Secure Calico Enterprise Prometheus endpoints
Restrict access to Calico Enterprise Prometheus metric endpoints with network policy so only authorized scrapers can read sensitive component telemetry.
Secure BGP sessions
Configure BGP session passwords on Calico Enterprise BGP peers to block attackers from injecting false routing information into the cluster.
Provide TLS certificates for Calico Enterprise Manager
Provide TLS certificates that secure browser access to the Calico Enterprise web console user interface in place of the default self-signed certificate.
Provide TLS certificates for log storage
Provide TLS certificates that secure access to Calico Enterprise log storage as part of a zero-trust deployment model.
Provide TLS certificates for Linseed APIs
Provide TLS certificates that secure access to the Calico Enterprise Linseed APIs as part of a zero-trust deployment model.
Provide TLS certificates for the API server
Provide TLS certificates that secure access to the Calico Enterprise API server as part of a zero-trust deployment model.
Provide TLS certificates for Typha and Node
Provide a custom CA and TLS certificates for mutual TLS authentication between Calico Enterprise Node and Typha components at scale.
Provide TLS certificates for compliance
Provide TLS certificates that secure access to the Calico Enterprise compliance components as part of a zero-trust deployment model.
Provide TLS certificates for PacketCapture APIs
Provide TLS certificates that secure access to the Calico Enterprise PacketCapture APIs as part of a zero-trust deployment model.
Manage TLS certificates used by Calico Enterprise
Manage TLS certificates for Calico Enterprise components by controlling the certificate issuer through the Kubernetes Certificates API and operator configuration.
Storage
Log storage recommendations
Reference recommendations for Calico Enterprise log storage covering Elastic Cloud on Kubernetes, StorageClasses, node sizing, and production capacity.
Configure storage for logs and reports
Configure persistent storage in Calico Enterprise for flow logs, DNS logs, audit logs, and compliance reports before installation.
Adjust log storage size
Resize the Calico Enterprise log storage cluster by tuning node counts, replicas, CPU, and memory during or after installation for production workloads.
Advanced Node Scheduling
Steer Calico Enterprise Elasticsearch pod and replica placement across Kubernetes nodes with data-node selectors and shard scheduling controls.
Monitoring
Prometheus support
Reference for Prometheus support in Calico Enterprise covering the bundled operator-managed install and bring-your-own Prometheus deployment options.
Bring your own Prometheus
Scrape Calico Enterprise component metrics from an existing bring-your-own Prometheus deployment instead of the bundled operator-managed Prometheus.
Configure Prometheus
Configure Calico Enterprise Prometheus rules for denied-packet alerts and persistent storage by editing the bundled PrometheusRule and StorageClass resources.
Configure Alertmanager
Configure Alertmanager in a Calico Enterprise cluster to route Prometheus alerts to operators with deduplication, grouping, silencing, and inhibition rules.
Recommended Prometheus metrics
Recommended Prometheus metrics for Calico Enterprise Typha, Felix, and policy components, covering the signals most critical to cluster health.
BGP metrics
Monitor BGP peering and route exchange in Calico Enterprise clusters by defining Prometheus rules and thresholds for peer health and route counts.
License metrics
Monitor Calico Enterprise license metrics such as how many days until license expires.
Policy metrics
Monitor the runtime effect of Calico Enterprise policies on cluster traffic by defining Prometheus rules and thresholds that fire alerts on policy hits.
Elasticsearch and Fluentd metrics
Track Calico Enterprise Elasticsearch and Fluentd metrics in Prometheus to alert on flow, DNS, audit, and compliance log collection or storage disruptions.
eBPF
eBPF use cases
Guidance on when the Calico Enterprise eBPF data plane fits a workload compared to the standard iptables data plane, with trade-offs and feature comparisons.
Enable eBPF on an existing cluster
Switch a running Calico Enterprise cluster to the eBPF data plane on an existing installation as an alternative to the iptables data plane.
Install in eBPF mode
Install Calico Enterprise with the eBPF data plane during initial cluster setup as an alternative to the iptables data plane.
Troubleshoot eBPF mode
Troubleshooting guide for the Calico Enterprise eBPF data plane covering verification logs, service connectivity, BPF map inspection, and common failure modes.
Troubleshooting
Troubleshooting and diagnostics
Troubleshooting guide for Calico Enterprise clusters covering kubectl-calico diagnostics bundles, log severity tuning, common failure patterns, and where to report issues.
Troubleshooting commands
Reference of command-line tools and kubectl invocations for verifying cluster, routing, policy, and component health in Calico Enterprise.
Component logs
Reference for locating and collecting Calico Enterprise component logs including calico/node, Felix, Typha, Linseed, and observability stack output.
Other operations tasks
Decommission a node
Manually decommission a node in a Calico Enterprise cluster, releasing IP allocations and BGP peers from the cluster datastore cleanly.
License expiration and renewal
Track Calico Enterprise license expiration through operator-exposed Prometheus metrics and renewal workflows to avoid unplanned cluster degradation.