Open the “Kubernetes” tab and click Create Cluster.
A new page will open. Perform the remaining steps there.
Select a region—the location of the data center where your cluster will be deployed.
Select your Kubernetes cluster version from the drop-down menu.
Under the Pools block, configure a pool. A pool is a set of cluster nodes with the same specifications.
Select the flavor, disk size in GiB, and disk type.
The following Virtual Instance flavors are available:
The following disk types are available:
The following Bare Metal flavors are available:
Ensure the Autohealing nodes toggle is on to enable automatic recovery of failed nodes. When toggled on, this feature monitors node statuses. Upon detecting a non-working node, the autohealer initiates its replacement. If one of the machines fails, the application will not stand idle: The node(s) will be replaced on a working machine, and the app will keep working.
(Optional) Enable the Public IPv4 address option to assign public IPv4 addresses to cluster nodes.
Add as many pools as you need using the Add pool button.
Choose either the Cilium or Calico network stack. These provide networking and network security solutions for containers.
You cannot change the network stack after the cluster has been created.
Select an existing network and subnet, or create a new network and/or subnet according to the instructions in our dedicated guide.
By default, your container is under Basic DDoS Protection. It can prevent certain attacks by blocking IP addresses that are used by malicious actors. But for a higher level of protection, we recommend enabling Advanced DDoS Protection.
You can enable Advanced DDoS Protection for your private network. To do so, activate the Enable Advanced DDoS Protection toggle, open the drop-down menu, and select the desired template from the list. We currently support the following templates: CS:GO, Rust, ARK, Basic L3/L4, or TCP protection.
The settings offered depend on the selected template. For example, for the Basic L3/L4 specify the uppermost threshold of attack in Gbps that our DDoS Protection can mitigate in the “Mitigation capacity” field.
Configure an SSH key to enable a remote SSH connection to all nodes. Select an existing key or create a new one. For details, consult our article on how to connect to your instance via SSH.
Name the cluster in the field as shown below.
Managed Logging is a paid feature that allows you to collect and store Kubernetes logs. For more details on Managed Logging, read our dedicated guide. To configure Managed Logging in the Gcore Customer Portal, choose one of two options:
Check the cluster settings on the right side of the screen. If everything is correct, click Create cluster.
The cluster will be created in just a few minutes!
Was this article helpful?
Discover our offerings, including virtual instances starting from 3.7 euro/mo, bare metal servers, AI Infrastructure, load balancers, Managed Kubernetes, Function as a Service, and Centralized Logging solutions.