Documentation
Introduction
Configuration
- HTTPProxy Fundamentals
 - Virtual Hosts
 - Inclusion and Delegation
 - TLS Termination
 - Upstream TLS
 - Request Routing
 - External Service Routing
 - Request Rewriting
 - CORS
 - Websockets
 - Upstream Health Checks
 - Client Authorization
 - TLS Delegation
 - Rate Limiting
 - Annotations Reference
 - API Reference
 
Deployment
- Deployment Options
 - Contour Configuration
 - Upgrading Contour
 - Enabling TLS between Envoy and Contour
 - Redeploy Envoy
 
Guides
- AWS with NLB
 - Cert-Manager
 - External Authorization
 - JSON logging
 - Migrating to HTTPProxy
 - Prometheus Metrics
 - PROXY Protocol Support
 - Resource Limits
 
Troubleshooting
- Envoy Administration Access
 - Contour Debug Logging
 - Envoy Debug Logging
 - Visualize the Contour Graph
 - Show Contour xDS Resources
 - Profiling Contour
 - Contour Operator
 
Resources
- Support Policy
 - Compatibility Matrix
 - Contour Deprecation Policy
 - Release Process
 - Frequently Asked Questions
 - Tagging
 
Contribute
Overview
Contour is an Ingress controller for Kubernetes that works by deploying the Envoy proxy as a reverse proxy and load balancer. Contour supports dynamic configuration updates out of the box while maintaining a lightweight profile.
Contour also introduces a new ingress API [HTTPProxy][2] which is implemented via a Custom Resource Definition (CRD). Its goal is to expand upon the functionality of the Ingress API to allow for a richer user experience as well as solve shortcomings in the original design.
Prerequisites
Contour is tested with Kubernetes clusters running version [1.16 and later][4].
RBAC must be enabled on your cluster.
Get started
Getting started with Contour is as simple as one command. See the [Getting Started][3] document.
[2]: {% link docs/v1.13.1/config/fundamentals.md %} [3]: {% link getting-started.md %} [4]: {% link _resources/compatibility-matrix.md %}
Twitter
Slack