github.com/projectcontour/contour@v1.28.2/site/content/docs/1.24/deploy-options.md (about) 1 # Deployment Options 2 3 The [Getting Started][8] guide shows you a simple way to get started with Contour on your cluster. 4 This topic explains the details and shows you additional options. 5 Most of this covers running Contour using a Kubernetes Service of `Type: LoadBalancer`. 6 If you don't have a cluster with that capability see the [Running without a Kubernetes LoadBalancer][1] section. 7 8 ## Installation 9 10 Contour requires a secret containing TLS certificates that are used to secure the gRPC communication between Contour<>Envoy. 11 This secret can be auto-generated by the Contour `certgen` job or provided by an administrator. 12 Traffic must be forwarded to Envoy, typically via a Service of `type: LoadBalancer`. 13 All other requirements such as RBAC permissions, configuration details, are provided or have good defaults for most installations. 14 15 ### Setting resource requests and limits 16 17 It is recommended that resource requests and limits be set on all Contour and Envoy containers. 18 The example YAML manifests used in the [Getting Started][8] guide do not include these, because the appropriate values can vary widely from user to user. 19 The table below summarizes the Contour and Envoy containers, and provides some reasonable resource requests to start with (note that these should be adjusted based on observed usage and expected load): 20 21 | Workload | Container | Request (mem) | Request (cpu) | 22 | ------------------- | ---------------- | ------------- | ------------- | 23 | deployment/contour | contour | 128Mi | 250m | 24 | daemonset/envoy | envoy | 256Mi | 500m | 25 | daemonset/envoy | shutdown-manager | 50Mi | 25m | 26 27 28 ### Envoy as Daemonset 29 30 The recommended installation is for Contour to run as a Deployment and Envoy to run as a Daemonset. 31 The example Damonset places a single instance of Envoy per node in the cluster as well as attaches to `hostPorts` on each node. 32 This model allows for simple scaling of Envoy instances as well as ensuring even distribution of instances across the cluster. 33 34 The [example daemonset manifest][2] or [Contour Operator][12] will create an installation based on these recommendations. 35 36 _Note: If the size of the cluster is scaled down, connections can be lost since Kubernetes Damonsets do not follow proper `preStop` hooks._ 37 _Note: Contour Operator is alpha and therefore follows the Contour [deprecation policy][13]._ 38 39 ### Envoy as Deployment 40 41 An alternative Envoy deployment model is utilizing a Kubernetes Deployment with a configured `podAntiAffinity` which attempts to mirror the Daemonset deployment model. 42 A benefit of this model compared to the Daemonset version is when a node is removed from the cluster, the proper shutdown events are available so connections can be cleanly drained from Envoy before terminating. 43 44 The [example deployment manifest][14] will create an installation based on these recommendations. 45 46 ## Testing your installation 47 48 ### Get your hostname or IP address 49 50 To retrieve the IP address or DNS name assigned to your Contour deployment, run: 51 52 ```bash 53 $ kubectl get -n projectcontour service envoy -o wide 54 ``` 55 56 On AWS, for example, the response looks like: 57 58 ``` 59 NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR 60 contour 10.106.53.14 a47761ccbb9ce11e7b27f023b7e83d33-2036788482.ap-southeast-2.elb.amazonaws.com 80:30274/TCP 3h app=contour 61 ``` 62 63 Depending on your cloud provider, the `EXTERNAL-IP` value is an IP address, or, in the case of Amazon AWS, the DNS name of the ELB created for Contour. Keep a record of this value. 64 65 Note that if you are running an Elastic Load Balancer (ELB) on AWS, you must add more details to your configuration to get the remote address of your incoming connections. 66 See the [instructions for enabling the PROXY protocol.][4] 67 68 #### Minikube 69 70 On Minikube, to get the IP address of the Contour service run: 71 72 ```bash 73 $ minikube service -n projectcontour envoy --url 74 ``` 75 76 The response is always an IP address, for example `http://192.168.99.100:30588`. This is used as CONTOUR_IP in the rest of the documentation. 77 78 #### kind 79 80 When creating the cluster on Kind, pass a custom configuration to allow Kind to expose port 80/443 to your local host: 81 82 ```yaml 83 kind: Cluster 84 apiVersion: kind.x-k8s.io/v1alpha4 85 nodes: 86 - role: control-plane 87 - role: worker 88 extraPortMappings: 89 - containerPort: 80 90 hostPort: 80 91 listenAddress: "0.0.0.0" 92 - containerPort: 443 93 hostPort: 443 94 listenAddress: "0.0.0.0" 95 ``` 96 97 Then run the create cluster command passing the config file as a parameter. 98 This file is in the `examples/kind` directory: 99 100 ```bash 101 $ kind create cluster --config examples/kind/kind-expose-port.yaml 102 ``` 103 104 Then, your CONTOUR_IP (as used below) will just be `localhost:80`. 105 106 _Note: We've created a public DNS record (`local.projectcontour.io`) which is configured to resolve to `127.0.0.1``. This allows you to use a real domain name in your kind cluster._ 107 108 ### Test with Ingress 109 110 The Contour repository contains an example deployment of the Kubernetes Up and Running demo application, [kuard][5]. 111 To test your Contour deployment, deploy `kuard` with the following command: 112 113 ```bash 114 $ kubectl apply -f https://projectcontour.io/examples/kuard.yaml 115 ``` 116 117 Then monitor the progress of the deployment with: 118 119 ```bash 120 $ kubectl get po,svc,ing -l app=kuard 121 ``` 122 123 You should see something like: 124 125 ``` 126 NAME READY STATUS RESTARTS AGE 127 po/kuard-370091993-ps2gf 1/1 Running 0 4m 128 po/kuard-370091993-r63cm 1/1 Running 0 4m 129 po/kuard-370091993-t4dqk 1/1 Running 0 4m 130 131 NAME CLUSTER-IP EXTERNAL-IP PORT(S) AGE 132 svc/kuard 10.110.67.121 <none> 80/TCP 4m 133 134 NAME HOSTS ADDRESS PORTS AGE 135 ing/kuard * 10.0.0.47 80 4m 136 ``` 137 138 ... showing that there are three Pods, one Service, and one Ingress that is bound to all virtual hosts (`*`). 139 140 In your browser, navigate your browser to the IP or DNS address of the Contour Service to interact with the demo application. 141 142 ### Test with HTTPProxy 143 144 To test your Contour deployment with [HTTPProxy][9], run the following command: 145 146 ```sh 147 $ kubectl apply -f https://projectcontour.io/examples/kuard-httpproxy.yaml 148 ``` 149 150 Then monitor the progress of the deployment with: 151 152 ```sh 153 $ kubectl get po,svc,httpproxy -l app=kuard 154 ``` 155 156 You should see something like: 157 158 ```sh 159 NAME READY STATUS RESTARTS AGE 160 pod/kuard-bcc7bf7df-9hj8d 1/1 Running 0 1h 161 pod/kuard-bcc7bf7df-bkbr5 1/1 Running 0 1h 162 pod/kuard-bcc7bf7df-vkbtl 1/1 Running 0 1h 163 164 NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE 165 service/kuard ClusterIP 10.102.239.168 <none> 80/TCP 1h 166 167 NAME FQDN TLS SECRET FIRST ROUTE STATUS STATUS DESCRIPT 168 httpproxy.projectcontour.io/kuard kuard.local <SECRET NAME IF TLS USED> valid valid HTTPProxy 169 ``` 170 171 ... showing that there are three Pods, one Service, and one HTTPProxy . 172 173 In your terminal, use curl with the IP or DNS address of the Contour Service to send a request to the demo application: 174 175 ```sh 176 $ curl -H 'Host: kuard.local' ${CONTOUR_IP} 177 ``` 178 179 ## Running without a Kubernetes LoadBalancer 180 181 If you can't or don't want to use a Service of `type: LoadBalancer` there are other ways to run Contour. 182 183 ### NodePort Service 184 185 If your cluster doesn't have the capability to configure a Kubernetes LoadBalancer, 186 or if you want to configure the load balancer outside Kubernetes, 187 you can change the Envoy Service in the [`02-service-envoy.yaml`][7] file and set `type` to `NodePort`. 188 189 This will have every node in your cluster listen on the resultant port and forward traffic to Contour. 190 That port can be discovered by taking the second number listed in the `PORT` column when listing the service, for example `30274` in `80:30274/TCP`. 191 192 Now you can point your browser at the specified port on any node in your cluster to communicate with Contour. 193 194 ### Host Networking 195 196 You can run Contour without a Kubernetes Service at all. 197 This is done by having the Envoy pod run with host networking. 198 Contour's examples utilize this model in the `/examples` directory. 199 To configure, set: `hostNetwork: true` and `dnsPolicy: ClusterFirstWithHostNet` on your Envoy pod definition. 200 Next, pass `--envoy-service-http-port=80 --envoy-service-https-port=443` to the contour `serve` command which instructs Envoy to listen directly on port 80/443 on each host that it is running. 201 This is best paired with a DaemonSet (perhaps paired with Node affinity) to ensure that a single instance of Contour runs on each Node. 202 See the [AWS NLB tutorial][10] as an example. 203 204 ## Upgrading Contour/Envoy 205 206 At times, it's needed to upgrade Contour, the version of Envoy, or both. 207 The included `shutdown-manager` can assist with watching Envoy for open connections while draining and give signal back to Kubernetes as to when it's fine to delete Envoy pods during this process. 208 209 See the [redeploy envoy][11] docs for more information about how to not drop active connections to Envoy. 210 Also see the [upgrade guides][15] on steps to roll out a new version of Contour. 211 212 ## Running Multiple Instances of Contour 213 214 It's possible to run multiple instances of Contour within a single Kubernetes cluster. 215 This can be useful for separating external vs. internal ingress, for having separate ingress controllers for different ingress classes, and more. 216 The recommended way to deploy multiple Contour instances is to put each instance in its own namespace. 217 This avoids most naming conflicts that would otherwise occur, and provides better logical separation between the instances. 218 However, it is also possible to deploy multiple instances in a single namespace if needed; this approach requires more modifications to the example manifests to function properly. 219 Each approach is described in detail below, using the [examples/contour][17] directory's manifests for reference. 220 221 ### In Separate Namespaces (recommended) 222 223 In general, this approach requires updating the `namespace` of all resources, as well as giving unique names to cluster-scoped resources to avoid conflicts. 224 225 - `00-common.yaml`: 226 - update the name of the `Namespace` 227 - update the namespace of both `ServiceAccounts` 228 - `01-contour-config.yaml`: 229 - update the namespace of the `ConfigMap` 230 - if you have any namespaced references within the ConfigMap contents (e.g. `fallback-certificate`, `envoy-client-certificate`), ensure those point to the correct namespace as well. 231 - `01-crds.yaml` will be shared between the two instances; no changes are needed. 232 - `02-job-certgen.yaml`: 233 - update the namespace of all resources 234 - update the namespace of the `ServiceAccount` subject within the `RoleBinding` 235 - `02-role-contour.yaml`: 236 - update the name of the `ClusterRole` to be unique 237 - update the namespace of the `Role` 238 - `02-rbac.yaml`: 239 - update the name of the `ClusterRoleBinding` to be unique 240 - update the namespace of the `RoleBinding` 241 - update the namespaces of the `ServiceAccount` subject within both resources 242 - update the name of the ClusterRole within the ClusterRoleBinding's roleRef to match the unique name used in `02-role-contour.yaml` 243 - `02-service-contour.yaml`: 244 - update the namespace of the `Service` 245 - `02-service-envoy.yaml`: 246 - update the namespace of the `Service` 247 - `03-contour.yaml`: 248 - update the namespace of the `Deployment` 249 - add an argument to the container, `--ingress-class-name=<unique ingress class>`, so this instance only processes Ingresses/HTTPProxies with the given ingress class. 250 - `03-envoy.yaml`: 251 - update the namespace of the `DaemonSet` 252 - remove the two `hostPort` definitions from the container (otherwise, these would conflict between the two instances) 253 254 255 ### In The Same Namespace 256 257 This approach requires giving unique names to all resources to avoid conflicts, and updating all resource references to use the correct names. 258 259 - `00-common.yaml`: 260 - update the names of both `ServiceAccounts` to be unique 261 - `01-contour-config.yaml`: 262 - update the name of the `ConfigMap` to be unique 263 - `01-crds.yaml` will be shared between the two instances; no changes are needed. 264 - `02-job-certgen.yaml`: 265 - update the names of all resources to be unique 266 - update the name of the `Role` within the `RoleBinding`'s roleRef to match the unique name used for the `Role` 267 - update the name of the `ServiceAccount` within the `RoleBinding`'s subjects to match the unique name used for the `ServiceAccount` 268 - update the serviceAccountName of the `Job` 269 - add an argument to the container, `--secrets-name-suffix=<unique suffix>`, so the generated TLS secrets have unique names 270 - update the spec.template.metadata.labels on the `Job` to be unique 271 - `02-role-contour.yaml`: 272 - update the names of the `ClusterRole` and `Role` to be unique 273 - `02-rbac.yaml`: 274 - update the names of the `ClusterRoleBinding` and `RoleBinding` to be unique 275 - update the roleRefs within both resources to reference the unique `Role` and `ClusterRole` names used in `02-role-contour.yaml` 276 - update the subjects within both resources to reference the unique `ServiceAccount` name used in `00-common.yaml` 277 - `02-service-contour.yaml`: 278 - update the name of the `Service` to be unique 279 - update the selector to be unique (this must match the labels used in `03-contour.yaml`, below) 280 - `02-service-envoy.yaml`: 281 - update the name of the `Service` to be unique 282 - update the selector to be unique (this must match the labels used in `03-envoy.yaml`, below) 283 - `03-contour.yaml`: 284 - update the name of the `Deployment` to be unique 285 - update the metadata.labels, the spec.selector.matchLabels, the spec.template.metadata.labels, and the spec.template.spec.affinity.podAntiAffinity labels to match the labels used in `02-service-contour.yaml` 286 - update the serviceAccountName to match the unique name used in `00-common.yaml` 287 - update the `contourcert` volume to reference the unique `Secret` name generated from `02-certgen.yaml` (e.g. `contourcert<unique-suffix>`) 288 - update the `contour-config` volume to reference the unique `ConfigMap` name used in `01-contour-config.yaml` 289 - add an argument to the container, `--leader-election-resource-name=<unique lease name>`, so this Contour instance uses a separate leader election `Lease` 290 - add an argument to the container, `--envoy-service-name=<unique envoy service name>`, referencing the unique name used in `02-service-envoy.yaml` 291 - add an argument to the container, `--ingress-class-name=<unique ingress class>`, so this instance only processes Ingresses/HTTPProxies with the given ingress class. 292 - `03-envoy.yaml`: 293 - update the name of the `DaemonSet` to be unique 294 - update the metadata.labels, the spec.selector.matchLabels, and the spec.template.metadata.labels to match the unique labels used in `02-service-envoy.yaml` 295 - update the `--xds-address` argument to the initContainer to use the unique name of the contour Service from `02-service-contour.yaml` 296 - update the serviceAccountName to match the unique name used in `00-common.yaml` 297 - update the `envoycert` volume to reference the unique `Secret` name generated from `02-certgen.yaml` (e.g. `envoycert<unique-suffix>`) 298 - remove the two `hostPort` definitions from the container (otherwise, these would conflict between the two instances) 299 300 ### Using the Gateway provisioner 301 302 The Contour Gateway provisioner also supports deploying multiple instances of Contour, either in the same namespace or different namespaces. 303 See [Getting Started with the Gateway provisioner][16] for more information on getting started with the Gateway provisioner. 304 To deploy multiple Contour instances, you create multiple `Gateways`, either in the same namespace or in different namespaces. 305 306 Note that although the provisioning request itself is made via a Gateway API resource (`Gateway`), this method of installation still allows you to use *any* of the supported APIs for defining virtual hosts and routes: `Ingress`, `HTTPProxy`, or Gateway API's `HTTPRoute` and `TLSRoute`. 307 308 If you are using `Ingress` or `HTTPProxy`, you will likely want to assign each Contour instance a different ingress class, so they each handle different subsets of `Ingress`/`HTTPProxy` resources. 309 To do this, [create two separate GatewayClasses][18], each with a different `ContourDeployment` parametersRef. 310 The `ContourDeployment` specs should look like: 311 312 ```yaml 313 kind: ContourDeployment 314 apiVersion: projectcontour.io/v1alpha1 315 metadata: 316 namespace: projectcontour 317 name: ingress-class-1 318 spec: 319 runtimeSettings: 320 ingress: 321 classNames: 322 - ingress-class-1 323 --- 324 kind: ContourDeployment 325 apiVersion: projectcontour.io/v1alpha1 326 metadata: 327 namespace: projectcontour 328 name: ingress-class-2 329 spec: 330 runtimeSettings: 331 ingress: 332 classNames: 333 - ingress-class-2 334 ``` 335 336 Then create each `Gateway` with the appropriate `spec.gatewayClassName`. 337 338 ## Running Contour in tandem with another ingress controller 339 340 If you're running multiple ingress controllers, or running on a cloudprovider that natively handles ingress, 341 you can specify the annotation `kubernetes.io/ingress.class: "contour"` on all ingresses that you would like Contour to claim. 342 You can customize the class name with the `--ingress-class-name` flag at runtime. (A comma-separated list of class names is allowed.) 343 If the `kubernetes.io/ingress.class` annotation is present with a value other than `"contour"`, Contour will ignore that ingress. 344 345 ## Uninstall Contour 346 347 To remove Contour from your cluster, delete the namespace: 348 349 ```bash 350 $ kubectl delete ns projectcontour 351 ``` 352 **Note**: The namespace may differ from above if [Contour Operator][12] was used to 353 deploy Contour. 354 355 ## Uninstall Contour Operator 356 357 To remove Contour Operator from your cluster, delete the operator's namespace: 358 359 ```bash 360 $ kubectl delete ns contour-operator 361 ``` 362 363 [1]: #running-without-a-kubernetes-loadbalancer 364 [2]: {{< param github_url>}}/tree/{{< param branch >}}/examples/render/contour.yaml 365 [3]: #host-networking 366 [4]: guides/proxy-proto.md 367 [5]: https://github.com/kubernetes-up-and-running/kuard 368 [7]: {{< param github_url>}}/tree/{{< param branch >}}/examples/contour/02-service-envoy.yaml 369 [8]: /getting-started 370 [9]: config/fundamentals.md 371 [10]: guides/deploy-aws-nlb.md 372 [11]: redeploy-envoy.md 373 [12]: https://github.com/projectcontour/contour-operator 374 [13]: https://projectcontour.io/resources/deprecation-policy/ 375 [14]: {{< param github_url>}}/tree/{{< param branch >}}/examples/render/contour-deployment.yaml 376 [15]: /resources/upgrading/ 377 [16]: https://projectcontour.io/getting-started/#option-3-contour-gateway-provisioner-alpha 378 [17]: {{< param github_url>}}/tree/{{< param branch >}}/examples/contour 379 [18]: guides/gateway-api/#next-steps