github.com/projectcontour/contour@v1.28.2/site/content/docs/1.24/deploy-options.md (about)

     1  # Deployment Options
     2  
     3  The [Getting Started][8] guide shows you a simple way to get started with Contour on your cluster.
     4  This topic explains the details and shows you additional options.
     5  Most of this covers running Contour using a Kubernetes Service of `Type: LoadBalancer`.
     6  If you don't have a cluster with that capability see the [Running without a Kubernetes LoadBalancer][1] section.
     7  
     8  ## Installation
     9  
    10  Contour requires a secret containing TLS certificates that are used to secure the gRPC communication between Contour<>Envoy.
    11  This secret can be auto-generated by the Contour `certgen` job or provided by an administrator.
    12  Traffic must be forwarded to Envoy, typically via a Service of `type: LoadBalancer`.
    13  All other requirements such as RBAC permissions, configuration details, are provided or have good defaults for most installations.
    14  
    15  ### Setting resource requests and limits
    16  
    17  It is recommended that resource requests and limits be set on all Contour and Envoy containers.
    18  The example YAML manifests used in the [Getting Started][8] guide do not include these, because the appropriate values can vary widely from user to user.
    19  The table below summarizes the Contour and Envoy containers, and provides some reasonable resource requests to start with (note that these should be adjusted based on observed usage and expected load):
    20  
    21  | Workload            | Container        | Request (mem) | Request (cpu) |
    22  | ------------------- | ---------------- | ------------- | ------------- |
    23  | deployment/contour  | contour          | 128Mi         | 250m          |
    24  | daemonset/envoy     | envoy            | 256Mi         | 500m          |
    25  | daemonset/envoy     | shutdown-manager | 50Mi          | 25m           |
    26  
    27  
    28  ### Envoy as Daemonset
    29  
    30  The recommended installation is for Contour to run as a Deployment and Envoy to run as a Daemonset.
    31  The example Damonset places a single instance of Envoy per node in the cluster as well as attaches to `hostPorts` on each node.
    32  This model allows for simple scaling of Envoy instances as well as ensuring even distribution of instances across the cluster.
    33  
    34  The [example daemonset manifest][2] or [Contour Operator][12] will create an installation based on these recommendations.
    35  
    36  _Note: If the size of the cluster is scaled down, connections can be lost since Kubernetes Damonsets do not follow proper `preStop` hooks._
    37  _Note: Contour Operator is alpha and therefore follows the Contour [deprecation policy][13]._
    38  
    39  ### Envoy as Deployment
    40  
    41  An alternative Envoy deployment model is utilizing a Kubernetes Deployment with a configured `podAntiAffinity` which attempts to mirror the Daemonset deployment model.
    42  A benefit of this model compared to the Daemonset version is when a node is removed from the cluster, the proper shutdown events are available so connections can be cleanly drained from Envoy before terminating.
    43  
    44  The [example deployment manifest][14] will create an installation based on these recommendations.
    45  
    46  ## Testing your installation
    47  
    48  ### Get your hostname or IP address
    49  
    50  To retrieve the IP address or DNS name assigned to your Contour deployment, run:
    51  
    52  ```bash
    53  $ kubectl get -n projectcontour service envoy -o wide
    54  ```
    55  
    56  On AWS, for example, the response looks like:
    57  
    58  ```
    59  NAME      CLUSTER-IP     EXTERNAL-IP                                                                    PORT(S)        AGE       SELECTOR
    60  contour   10.106.53.14   a47761ccbb9ce11e7b27f023b7e83d33-2036788482.ap-southeast-2.elb.amazonaws.com   80:30274/TCP   3h        app=contour
    61  ```
    62  
    63  Depending on your cloud provider, the `EXTERNAL-IP` value is an IP address, or, in the case of Amazon AWS, the DNS name of the ELB created for Contour. Keep a record of this value.
    64  
    65  Note that if you are running an Elastic Load Balancer (ELB) on AWS, you must add more details to your configuration to get the remote address of your incoming connections.
    66  See the [instructions for enabling the PROXY protocol.][4]
    67  
    68  #### Minikube
    69  
    70  On Minikube, to get the IP address of the Contour service run:
    71  
    72  ```bash
    73  $ minikube service -n projectcontour envoy --url
    74  ```
    75  
    76  The response is always an IP address, for example `http://192.168.99.100:30588`. This is used as CONTOUR_IP in the rest of the documentation.
    77  
    78  #### kind
    79  
    80  When creating the cluster on Kind, pass a custom configuration to allow Kind to expose port 80/443 to your local host:
    81  
    82  ```yaml
    83  kind: Cluster
    84  apiVersion: kind.x-k8s.io/v1alpha4
    85  nodes:
    86  - role: control-plane
    87  - role: worker
    88    extraPortMappings:
    89    - containerPort: 80
    90      hostPort: 80
    91      listenAddress: "0.0.0.0"  
    92    - containerPort: 443
    93      hostPort: 443
    94      listenAddress: "0.0.0.0"
    95  ```
    96  
    97  Then run the create cluster command passing the config file as a parameter.
    98  This file is in the `examples/kind` directory:
    99  
   100  ```bash
   101  $ kind create cluster --config examples/kind/kind-expose-port.yaml
   102  ```
   103  
   104  Then, your CONTOUR_IP (as used below) will just be `localhost:80`.
   105  
   106  _Note: We've created a public DNS record (`local.projectcontour.io`) which is configured to resolve to `127.0.0.1``. This allows you to use a real domain name in your kind cluster._
   107  
   108  ### Test with Ingress
   109  
   110  The Contour repository contains an example deployment of the Kubernetes Up and Running demo application, [kuard][5].
   111  To test your Contour deployment, deploy `kuard` with the following command:
   112  
   113  ```bash
   114  $ kubectl apply -f https://projectcontour.io/examples/kuard.yaml
   115  ```
   116  
   117  Then monitor the progress of the deployment with:
   118  
   119  ```bash
   120  $ kubectl get po,svc,ing -l app=kuard
   121  ```
   122  
   123  You should see something like:
   124  
   125  ```
   126  NAME                       READY     STATUS    RESTARTS   AGE
   127  po/kuard-370091993-ps2gf   1/1       Running   0          4m
   128  po/kuard-370091993-r63cm   1/1       Running   0          4m
   129  po/kuard-370091993-t4dqk   1/1       Running   0          4m
   130  
   131  NAME        CLUSTER-IP      EXTERNAL-IP   PORT(S)   AGE
   132  svc/kuard   10.110.67.121   <none>        80/TCP    4m
   133  
   134  NAME        HOSTS     ADDRESS     PORTS     AGE
   135  ing/kuard   *         10.0.0.47   80        4m
   136  ```
   137  
   138  ... showing that there are three Pods, one Service, and one Ingress that is bound to all virtual hosts (`*`).
   139  
   140  In your browser, navigate your browser to the IP or DNS address of the Contour Service to interact with the demo application.
   141  
   142  ### Test with HTTPProxy
   143  
   144  To test your Contour deployment with [HTTPProxy][9], run the following command:
   145  
   146  ```sh
   147  $ kubectl apply -f https://projectcontour.io/examples/kuard-httpproxy.yaml
   148  ```
   149  
   150  Then monitor the progress of the deployment with:
   151  
   152  ```sh
   153  $ kubectl get po,svc,httpproxy -l app=kuard
   154  ```
   155  
   156  You should see something like:
   157  
   158  ```sh
   159  NAME                        READY     STATUS    RESTARTS   AGE
   160  pod/kuard-bcc7bf7df-9hj8d   1/1       Running   0          1h
   161  pod/kuard-bcc7bf7df-bkbr5   1/1       Running   0          1h
   162  pod/kuard-bcc7bf7df-vkbtl   1/1       Running   0          1h
   163  
   164  NAME            TYPE        CLUSTER-IP       EXTERNAL-IP   PORT(S)   AGE
   165  service/kuard   ClusterIP   10.102.239.168   <none>        80/TCP    1h
   166  
   167  NAME                                    FQDN                TLS SECRET                  FIRST ROUTE  STATUS  STATUS DESCRIPT
   168  httpproxy.projectcontour.io/kuard      kuard.local         <SECRET NAME IF TLS USED>                valid   valid HTTPProxy
   169  ```
   170  
   171  ... showing that there are three Pods, one Service, and one HTTPProxy .
   172  
   173  In your terminal, use curl with the IP or DNS address of the Contour Service to send a request to the demo application:
   174  
   175  ```sh
   176  $ curl -H 'Host: kuard.local' ${CONTOUR_IP}
   177  ```
   178  
   179  ## Running without a Kubernetes LoadBalancer
   180  
   181  If you can't or don't want to use a Service of `type: LoadBalancer` there are other ways to run Contour.
   182  
   183  ### NodePort Service
   184  
   185  If your cluster doesn't have the capability to configure a Kubernetes LoadBalancer,
   186  or if you want to configure the load balancer outside Kubernetes,
   187  you can change the Envoy Service in the [`02-service-envoy.yaml`][7] file and set `type` to `NodePort`.
   188  
   189  This will have every node in your cluster listen on the resultant port and forward traffic to Contour.
   190  That port can be discovered by taking the second number listed in the `PORT` column when listing the service, for example `30274` in `80:30274/TCP`.
   191  
   192  Now you can point your browser at the specified port on any node in your cluster to communicate with Contour.
   193  
   194  ### Host Networking
   195  
   196  You can run Contour without a Kubernetes Service at all.
   197  This is done by having the Envoy pod run with host networking.
   198  Contour's examples utilize this model in the `/examples` directory.
   199  To configure, set: `hostNetwork: true` and `dnsPolicy: ClusterFirstWithHostNet` on your Envoy pod definition.
   200  Next, pass `--envoy-service-http-port=80 --envoy-service-https-port=443` to the contour `serve` command which instructs Envoy to listen directly on port 80/443 on each host that it is running.
   201  This is best paired with a DaemonSet (perhaps paired with Node affinity) to ensure that a single instance of Contour runs on each Node.
   202  See the [AWS NLB tutorial][10] as an example.
   203  
   204  ## Upgrading Contour/Envoy
   205  
   206  At times, it's needed to upgrade Contour, the version of Envoy, or both.
   207  The included `shutdown-manager` can assist with watching Envoy for open connections while draining and give signal back to Kubernetes as to when it's fine to delete Envoy pods during this process.
   208  
   209  See the [redeploy envoy][11] docs for more information about how to not drop active connections to Envoy.
   210  Also see the [upgrade guides][15] on steps to roll out a new version of Contour.
   211  
   212  ## Running Multiple Instances of Contour
   213  
   214  It's possible to run multiple instances of Contour within a single Kubernetes cluster.
   215  This can be useful for separating external vs. internal ingress, for having separate ingress controllers for different ingress classes, and more.
   216  The recommended way to deploy multiple Contour instances is to put each instance in its own namespace.
   217  This avoids most naming conflicts that would otherwise occur, and provides better logical separation between the instances.
   218  However, it is also possible to deploy multiple instances in a single namespace if needed; this approach requires more modifications to the example manifests to function properly.
   219  Each approach is described in detail below, using the [examples/contour][17] directory's manifests for reference.
   220  
   221  ### In Separate Namespaces (recommended)
   222  
   223  In general, this approach requires updating the `namespace` of all resources, as well as giving unique names to cluster-scoped resources to avoid conflicts.
   224  
   225  - `00-common.yaml`:
   226    - update the name of the `Namespace`
   227    - update the namespace of both `ServiceAccounts`
   228  - `01-contour-config.yaml`: 
   229    - update the namespace of the `ConfigMap`
   230    - if you have any namespaced references within the ConfigMap contents (e.g. `fallback-certificate`, `envoy-client-certificate`), ensure those point to the correct namespace as well.
   231  - `01-crds.yaml` will be shared between the two instances; no changes are needed.
   232  - `02-job-certgen.yaml`: 
   233    - update the namespace of all resources
   234    - update the namespace of the `ServiceAccount` subject within the `RoleBinding`
   235  - `02-role-contour.yaml`:
   236    - update the name of the `ClusterRole` to be unique
   237    - update the namespace of the `Role`
   238  - `02-rbac.yaml`: 
   239    - update the name of the `ClusterRoleBinding` to be unique
   240    - update the namespace of the `RoleBinding`
   241    - update the namespaces of the `ServiceAccount` subject within both resources
   242    - update the name of the ClusterRole within the ClusterRoleBinding's roleRef to match the unique name used in `02-role-contour.yaml`
   243  - `02-service-contour.yaml`:
   244    - update the namespace of the `Service`
   245  - `02-service-envoy.yaml`:
   246    - update the namespace of the `Service`
   247  - `03-contour.yaml`:
   248    - update the namespace of the `Deployment`
   249    - add an argument to the container, `--ingress-class-name=<unique ingress class>`, so this instance only processes Ingresses/HTTPProxies with the given ingress class.
   250  - `03-envoy.yaml`:
   251    - update the namespace of the `DaemonSet`
   252    - remove the two `hostPort` definitions from the container (otherwise, these would conflict between the two instances)
   253  
   254  
   255  ### In The Same Namespace
   256  
   257  This approach requires giving unique names to all resources to avoid conflicts, and updating all resource references to use the correct names.
   258  
   259  - `00-common.yaml`:
   260    - update the names of both `ServiceAccounts` to be unique
   261  - `01-contour-config.yaml`:
   262    - update the name of the `ConfigMap` to be unique
   263  - `01-crds.yaml` will be shared between the two instances; no changes are needed.
   264  - `02-job-certgen.yaml`:
   265    - update the names of all resources to be unique
   266    - update the name of the `Role` within the `RoleBinding`'s roleRef to match the unique name used for the `Role`
   267    - update the name of the `ServiceAccount` within the `RoleBinding`'s subjects to match the unique name used for the `ServiceAccount`
   268    - update the serviceAccountName of the `Job`
   269    - add an argument to the container, `--secrets-name-suffix=<unique suffix>`, so the generated TLS secrets have unique names
   270    - update the spec.template.metadata.labels on the `Job` to be unique
   271  - `02-role-contour.yaml`:
   272    - update the names of the `ClusterRole` and `Role` to be unique
   273  - `02-rbac.yaml`:
   274    - update the names of the `ClusterRoleBinding` and `RoleBinding` to be unique
   275    - update the roleRefs within both resources to reference the unique `Role` and `ClusterRole` names used in `02-role-contour.yaml`
   276    - update the subjects within both resources to reference the unique `ServiceAccount` name used in `00-common.yaml`
   277  - `02-service-contour.yaml`:
   278    - update the name of the `Service` to be unique
   279    - update the selector to be unique (this must match the labels used in `03-contour.yaml`, below)
   280  - `02-service-envoy.yaml`:
   281    - update the name of the `Service` to be unique
   282    - update the selector to be unique (this must match the labels used in `03-envoy.yaml`, below)
   283  - `03-contour.yaml`:
   284    - update the name of the `Deployment` to be unique
   285    - update the metadata.labels, the spec.selector.matchLabels, the spec.template.metadata.labels, and the spec.template.spec.affinity.podAntiAffinity labels to match the labels used in `02-service-contour.yaml`
   286    - update the serviceAccountName to match the unique name used in `00-common.yaml`
   287    - update the `contourcert` volume to reference the unique `Secret` name generated from `02-certgen.yaml` (e.g. `contourcert<unique-suffix>`)
   288    - update the `contour-config` volume to reference the unique `ConfigMap` name used in `01-contour-config.yaml`
   289    - add an argument to the container, `--leader-election-resource-name=<unique lease name>`, so this Contour instance uses a separate leader election `Lease`
   290    - add an argument to the container, `--envoy-service-name=<unique envoy service name>`, referencing the unique name used in `02-service-envoy.yaml`
   291    - add an argument to the container, `--ingress-class-name=<unique ingress class>`, so this instance only processes Ingresses/HTTPProxies with the given ingress class.
   292  - `03-envoy.yaml`:
   293    - update the name of the `DaemonSet` to be unique
   294    - update the metadata.labels, the spec.selector.matchLabels, and the spec.template.metadata.labels to match the unique labels used in `02-service-envoy.yaml`
   295    - update the `--xds-address` argument to the initContainer to use the unique name of the contour Service from `02-service-contour.yaml`
   296    - update the serviceAccountName to match the unique name used in `00-common.yaml`
   297    - update the `envoycert` volume to reference the unique `Secret` name generated from `02-certgen.yaml` (e.g. `envoycert<unique-suffix>`)
   298    - remove the two `hostPort` definitions from the container (otherwise, these would conflict between the two instances)
   299  
   300  ### Using the Gateway provisioner
   301  
   302  The Contour Gateway provisioner also supports deploying multiple instances of Contour, either in the same namespace or different namespaces.
   303  See [Getting Started with the Gateway provisioner][16] for more information on getting started with the Gateway provisioner.
   304  To deploy multiple Contour instances, you create multiple `Gateways`, either in the same namespace or in different namespaces.
   305  
   306  Note that although the provisioning request itself is made via a Gateway API resource (`Gateway`), this method of installation still allows you to use *any* of the supported APIs for defining virtual hosts and routes: `Ingress`, `HTTPProxy`, or Gateway API's `HTTPRoute` and `TLSRoute`.
   307  
   308  If you are using `Ingress` or `HTTPProxy`, you will likely want to assign each Contour instance a different ingress class, so they each handle different subsets of `Ingress`/`HTTPProxy` resources.
   309  To do this, [create two separate GatewayClasses][18], each with a different `ContourDeployment` parametersRef.
   310  The `ContourDeployment` specs should look like:
   311  
   312  ```yaml
   313  kind: ContourDeployment
   314  apiVersion: projectcontour.io/v1alpha1
   315  metadata:
   316    namespace: projectcontour
   317    name: ingress-class-1
   318  spec:
   319    runtimeSettings:
   320      ingress:
   321        classNames:
   322          - ingress-class-1
   323  ---
   324  kind: ContourDeployment
   325  apiVersion: projectcontour.io/v1alpha1
   326  metadata:
   327    namespace: projectcontour
   328    name: ingress-class-2
   329  spec:
   330    runtimeSettings:
   331      ingress:
   332        classNames:
   333          - ingress-class-2
   334  ```
   335  
   336  Then create each `Gateway` with the appropriate `spec.gatewayClassName`.
   337  
   338  ## Running Contour in tandem with another ingress controller
   339  
   340  If you're running multiple ingress controllers, or running on a cloudprovider that natively handles ingress,
   341  you can specify the annotation `kubernetes.io/ingress.class: "contour"` on all ingresses that you would like Contour to claim.
   342  You can customize the class name with the `--ingress-class-name` flag at runtime. (A comma-separated list of class names is allowed.)
   343  If the `kubernetes.io/ingress.class` annotation is present with a value other than `"contour"`, Contour will ignore that ingress.
   344  
   345  ## Uninstall Contour
   346  
   347  To remove Contour from your cluster, delete the namespace:
   348  
   349  ```bash
   350  $ kubectl delete ns projectcontour
   351  ```
   352  **Note**: The namespace may differ from above if [Contour Operator][12] was used to
   353  deploy Contour.
   354  
   355  ## Uninstall Contour Operator
   356  
   357  To remove Contour Operator from your cluster, delete the operator's namespace:
   358  
   359  ```bash
   360  $ kubectl delete ns contour-operator
   361  ```
   362  
   363  [1]: #running-without-a-kubernetes-loadbalancer
   364  [2]: {{< param github_url>}}/tree/{{< param branch >}}/examples/render/contour.yaml
   365  [3]: #host-networking
   366  [4]: guides/proxy-proto.md
   367  [5]: https://github.com/kubernetes-up-and-running/kuard
   368  [7]: {{< param github_url>}}/tree/{{< param branch >}}/examples/contour/02-service-envoy.yaml
   369  [8]: /getting-started
   370  [9]: config/fundamentals.md
   371  [10]: guides/deploy-aws-nlb.md
   372  [11]: redeploy-envoy.md
   373  [12]: https://github.com/projectcontour/contour-operator
   374  [13]: https://projectcontour.io/resources/deprecation-policy/
   375  [14]: {{< param github_url>}}/tree/{{< param branch >}}/examples/render/contour-deployment.yaml
   376  [15]: /resources/upgrading/
   377  [16]: https://projectcontour.io/getting-started/#option-3-contour-gateway-provisioner-alpha
   378  [17]: {{< param github_url>}}/tree/{{< param branch >}}/examples/contour
   379  [18]: guides/gateway-api/#next-steps