Open the “Kubernetes” tab and click Create Cluster.
A new page will open. Perform the remaining steps there.
Select a region—the location of the data center where your cluster will be deployed.
Select your Kubernetes cluster version from the dropdown menu.
Under the Pools block, configure a pool. A pool is a set of cluster nodes with the same specifications.
Select the flavor, disk size in GiB, and disk type.
The following Virtual Machine flavors are available:
The following disk types are available:
The following Bare Metal flavors are available:
Ensure the Autohealing nodes toggle is on to enable automatic recovery of failed nodes. When toggled on, this feature monitors node statuses. Upon detecting a non-working node, the autohealer initiates its replacement. If one of the machines fails, the application will not stand idle: The node(s) will be replaced on a working machine, and the app will keep working.
(Optional) Enable the Public IPv4 address option to assign public IPv4 addresses to cluster nodes.
If you want to enable an IPv6 dual-stack for your cluster, at least one of the pools must have a public IPv4 address.
Choose either the Cilium or Calico network stack. These provide networking and network security solutions for containers.
Cilium uses eBPF to inject functionality into the kernel and provides a broader range of additional features (load balancing, advanced security, failure detection, etc.) than Calico. You can add additional functions as required by checking the relevant box for DSR, tunneling, Load Balancer acceleration, and encryption.
Calico uses a more conservative stack based on iptables.
You can also enable Hubble UI for the Cilium and use the graphical interface to check your cluster's network traffic.
(Optional) Set up the CIDR range for pods in a cluster. The default ranges are:
Calico:
For pods: 172.16.0.0/18
For services: 172.24.0.0/18
Cilium:
For pods: 172.16.0.0/17
For services: 172.24.0.0/17
Your CIRD range can't overlap with the following ranges: 10.255.255.0/24, 192.168.128.0/17. These ranges are reserved for internal usage.
You cannot change the network stack after the cluster has been created.
Add one or multiple network interfaces to your cluster.
If you have previously created networks, select the correct network from the dropdown.
To add a new network, click Add a new network radio button and configure the network as follows:
1. Enter the network name.
2. (optional) Turn on the Bare Metal network toggle to connect Bare Metal servers to the network.
3. (optional) Turn on the Add tags toggle to add metadata to the network.
4. Click Create network.
5. (Optional) Enable IPv6 dual-stack to assign both IPv4 and IPv6 addresses for network interfaces of worker nodes and pods. If the Enable IPv6 dual-stack toggle is not available, make sure that at least one pool from your cluster is in a public network. If your Kubernetes cluster is only connected to a private network, you also need to configure and add an IPv6 subnetwork.
If you have previously created subnetworks, select the correct subnetwork from the dropdown.
To add a new subnetwork, click Add a new subnetwork and configure it according to the following instructions: Create a subnetwork.
By default, your container is under Basic DDoS Protection. It can prevent certain attacks by blocking IP addresses used by malicious actors. For a higher level of protection, we recommend enabling Advanced DDoS Protection.
You can enable Advanced DDoS Protection for your private network. To do so, activate the Enable Advanced DDoS Protection toggle, open the drop-down menu, and select the desired template from the list. We currently support the following templates: CS:GO, Rust, ARK, Basic L3/L4, or TCP protection.
The settings offered depend on the selected template. For example, for the Basic L3/L4 specify the uppermost threshold of attack in Gbps that our DDoS Protection can mitigate in the “Mitigation capacity” field.
Configure an SSH key to enable a remote SSH connection to all nodes. Select an existing key or create a new one. For details, consult our article on how to connect to your VM via SSH.
Name the cluster in the field as shown below.
Managed Logging is a paid feature that allows you to collect and store Kubernetes logs. For more details on Managed Logging, read our dedicated guide. To configure Managed Logging in the Gcore Customer Portal, choose one of two options:
Enable OIDC authentication for your cluster. Follow instructions from the Secure Kubernetes cluster with OIDC authentication guide.
You can also configure cluster autoscaler settings that will apply to the entire Kubernetes cluster and affect all nodes. For detailed overview of each configuration, check out Advanced Cluster Autoscaler settings.
Check the cluster settings on the right side of the screen. If everything is correct, click Create cluster.
The cluster will be created in just a few minutes!
Was this article helpful?
Discover our offerings, including virtual instances starting from 3.7 euro/mo, bare metal servers, AI Infrastructure, load balancers, Managed Kubernetes, Function as a Service, and Centralized Logging solutions.