Contour Logo

Blog

Jan 1, 0001

The Contour Ingress controller is a collaboration between:

  • Envoy, which provides the high performance reverse proxy.
  • Contour, which acts as a management server for Envoy and provides it with configuration.

These containers are deployed separately, Contour as a Deployment and Envoy as a Daemonset, although other configurations are possible.

In the Envoy Pods, Contour runs as an initcontainer in bootstrap mode and writes a bootstrap configuration to a temporary volume. This volume is passed to the Envoy container and directs Envoy to treat Contour as its management server.

After initialisation is complete, the Envoy container starts, retrieves the bootstrap configuration written by Contour’s bootstrap mode, and starts to poll Contour for configuration.

Envoy will gracefully retry if the management server is unavailable, which removes any container startup ordering issues.

Contour is a client of the Kubernetes API. Contour watches Ingress, Service, and Endpoint objects, and acts as the management server for its Envoy sibling by translating its cache of objects into the relevant JSON stanzas: Service objects for CDS, Ingress for RDS, Endpoint objects for SDS, and so on).

The transfer of information from Kubernetes to Contour is by watching the API with the SharedInformer framework. The transfer of information from Contour to Envoy is by polling from the Envoy side.

Kubernetes liveness and readiness probes are configured to check the status of Envoy. These are enabled over the metrics port and are served over http via /healthz.

For Contour, a liveness probe checks the /healthz running on the Pod’s metrics port. Readiness probe is a TCP check that the gRPC port is open.

Related Content

Ready to try Contour?

Read our getting started documentation.