The README shows you a simple way to get started with Contour on your cluster. This topic explains the details and shows you additional options. Most of this covers running Contour using a Kubernetes Service of Type: LoadBalancer
. If you don't have a cluster with that capability or if you don't want to use it see the Running without a Kubernetes LoadBalancer section.
We provide example deployment manifests for setting up Contour by creating either a DaemonSet or a Deployment.
- The DaemonSet creates an instance of Contour that runs on each node in your cluster.
- The Deployment creates two instances of Contour that run on the cluster, on two arbitrary nodes.
In either case, a Service of type: LoadBalancer
is set up to forward to the Contour instances.
- Clone or fork the repository.
- To install the DaemonSet, navigate to the
examples/ds-grpc-v2
directory. OR - To install the Deployment, navigate to the
examples/deployment-grpc-v2
.
Then run:
kubectl apply -f .
Contour is now deployed. Depending on your cloud provider, it may take some time to configure the load balancer.
Each directory contains four files:
01-common.yaml
: Creates theheptio-contour
Namespace and a ServiceAccount.02-rbac.yaml
: Creates the RBAC rules for Contour. The Contour RBAC permissions are the minimum required for Contour to operate.02-contour.yaml
: Runs the Contour pods with either the DaemonSet or the Deployment. See Architecture for pod details.02-service.yaml
: Creates the Service object so that Contour can be reached from outside the cluster.
To retrieve the IP address or DNS name assigned to your Contour deployment, run:
kubectl get -n heptio-contour service contour -o wide
On AWS, for example, the response looks like:
NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR
contour 10.106.53.14 a47761ccbb9ce11e7b27f023b7e83d33-2036788482.ap-southeast-2.elb.amazonaws.com 80:30274/TCP 3h app=contour
Depending on your cloud provider, the EXTERNAL-IP
value is an IP address, or, in the case of Amazon AWS, the DNS name of the ELB created for Contour. Keep a record of this value.
Note that if you are running an Elastic Load Balancer (ELB) on AWS, you must add more details to your configuration to get the remote address of your incoming connections. See Recovering the remote IP address with an ELB.
On Minikube, to get the IP address of the Contour service run:
minikube service -n heptio-contour contour --url
The response is always an IP address, for example http://192.168.99.100:30588
. This is used as CONTOUR_IP in the rest of the documentation.
On kind, you will need to port-forward to the exposed Envoy port on one of the contour pods, like so:
kubectl port-forward -n heptio-contour $(kubectl get pod -n heptio-contour -l app=contour -o name | head -n1) 8080:8080
Then, your CONTOUR_IP (as used below) will just be localhost:8080
.
The Contour repository contains an example deployment of the Kubernetes Up and Running demo application, kuard.
To test your Contour deployment, deploy kuard
with the following command:
kubectl apply -f examples/example-workload/kuard.yaml
Then monitor the progress of the deployment with:
kubectl get po,svc,ing -l app=kuard
You should see something like:
NAME READY STATUS RESTARTS AGE
po/kuard-370091993-ps2gf 1/1 Running 0 4m
po/kuard-370091993-r63cm 1/1 Running 0 4m
po/kuard-370091993-t4dqk 1/1 Running 0 4m
NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE
svc/kuard 10.110.67.121 <none> 80/TCP 4m
NAME HOSTS ADDRESS PORTS AGE
ing/kuard * 10.0.0.47 80 4m
... showing that there are three Pods, one Service, and one Ingress that is bound to all virtual hosts (*
).
In your browser, navigate your browser to the IP or DNS address of the Contour Service to interact with the demo application.
To test your Contour deployment with IngressRoutes, run the following command:
kubectl apply -f examples/example-workload/kuard-ingressroute.yaml
Then monitor the progress of the deployment with:
kubectl get po,svc,ingressroute -l app=kuard
You should see something like:
NAME READY STATUS RESTARTS AGE
pod/kuard-bcc7bf7df-9hj8d 1/1 Running 0 1h
pod/kuard-bcc7bf7df-bkbr5 1/1 Running 0 1h
pod/kuard-bcc7bf7df-vkbtl 1/1 Running 0 1h
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/kuard ClusterIP 10.102.239.168 <none> 80/TCP 1h
NAME CREATED AT
ingressroute.contour.heptio.com/kuard 1h
... showing that there are three Pods, one Service, and one IngressRoute.
In your terminal, use curl with the IP or DNS address of the Contour Service to send a request to the demo application:
curl -H 'Host: kuard.local' ${CONTOUR_IP}
If you can't or don't want to use a Service of type: LoadBalancer
there are two alternate ways to run Contour.
As mentioned above, when you are doing local development, you can run a local cluster with minikube or kind. Follow the instructions under Get your hostname or IP address to get access, then use your user agent of choice.
If your cluster doesn't have the capability to configure a Kubernetes LoadBalancer, or if you want to configure the load balancer outside Kubernetes, you can change the 02-service.yaml
file to set type
to NodePort
. This will have every node in your cluster listen on the resultant port and forward traffic to Contour. That port can be discovered by taking the second number listed in the PORT
column when listing the service, for example 30274
in 80:30274/TCP
.
Now you can point your browser at the specified port on any node in your cluster to communicate with Contour.
You can run Contour without a Kubernetes Service at all.
This is done by having the Contour pod run with host networking.
Do this with hostNetwork: true
on your pod definition.
Envoy will listen directly on port 8080 on each host that it is running.
This is best paired with a DaemonSet (perhaps paired with Node affinity) to ensure that a single instance of Contour runs on each Node.
See the AWS NLB tutorial as an example.
If you're running multiple ingress controllers, or running on a cloudprovider that natively handles ingress, you can specify the annotation kubernetes.io/ingress.class: "contour"
on all ingresses that you would like Contour to claim. You can customize the class name with the --ingress-class-name
flag at runtime.
If the kubernetes.io/ingress.class
annotation is present with a value other than "contour"
, Contour will ignore that ingress.
To remove Contour from your cluster, delete the namespace:
% kubectl delete ns heptio-contour