Skip to content

Latest commit

 

History

History
110 lines (84 loc) · 4.69 KB

troubleshooting.md

File metadata and controls

110 lines (84 loc) · 4.69 KB

Troubleshooting

This document contains suggestions for debugging issues with your Contour installation.

Envoy container not listening on port 8080 or 8443

Contour does not configure Envoy to listen on a port unless there is traffic to be served. For example, if you have not configured any TLS ingress objects then Contour does not command Envoy to open port 8443 (443 in the service object). Because the HTTP and HTTPS listeners both use the same code, if you have no ingress objects deployed in your cluster, or if no ingress objects are permitted to talk on HTTP, then Envoy does not listen on port 8080 (80 in the service object).

To test whether Contour is correctly deployed you can deploy the kuard example service:

$ kubectl apply -f https://j.hept.io/contour-kuard-example

Access the Envoy admin interface remotely

Getting access to the Envoy admin interface can be useful for diagnosing issues with routing or cluster health.

The Envoy admin interface is bound by default to http://127.0.0.1:9001. To access it from your workstation use kubectl port-forward like so,

# Get one of the pods that matches the deployment/daemonset
CONTOUR_POD=$(kubectl -n heptio-contour get pod -l app=contour -o jsonpath='{.items[0].metadata.name}')
# Do the port forward to that pod
kubectl -n heptio-contour port-forward $CONTOUR_POD 9001

Then navigate to http://127.0.0.1:9001/ to access the admin interface for the Envoy container running on that pod.

Accessing Contour's /debug/pprof service

Contour exposes the net/http/pprof handlers for go tool pprof and go tool trace by default on 127.0.0.1:6060. This service is useful for profiling Contour. To access it from your workstation use kubectl port-forward like so,

# Get one of the pods that matches the deployment/daemonset
CONTOUR_POD=$(kubectl -n heptio-contour get pod -l app=contour -o jsonpath='{.items[0].metadata.name}')
# Do the port forward to that pod
kubectl -n heptio-contour port-forward $CONTOUR_POD 6060

Visualizing Contour's internal directed acyclic graph (DAG)

Contour models its configuration using a DAG, which can be visualized through a debug endpoint that outputs the DAG in DOT format. To visualize the graph, you must have graphviz installed on your system.

To download the graph and save it as a PNG:

# Port forward into the contour pod
CONTOUR_POD=$(kubectl -n heptio-contour get pod -l app=contour -o jsonpath='{.items[0].metadata.name}')
# Do the port forward to that pod
kubectl -n heptio-contour port-forward $CONTOUR_POD 6060
# Download and store the DAG in png format
curl localhost:6060/debug/dag | dot -T png > contour-dag.png

The following is an example of a DAG that maps http://kuard.local:80/ to the kuard service in the default namespace:

Sample DAG

Interrogate Contour's gRPC API

Sometimes it's helpful to be able to interrogate Contour to find out exactly the data it is sending to Envoy. Contour ships with a contour cli subcommand which can be used for this purpose.

Because Contour runs as a sidecar with Envoy, you must run contour cli commands inside the pod. The easiest way do this is via kubectl exec

# Get one of the pods that matches the deployment/daemonset
CONTOUR_POD=$(kubectl -n heptio-contour get pod -l app=contour -o jsonpath='{.items[0].metadata.name}')
# Do the port forward to that pod
kubectl -n heptio-contour exec $CONTOUR_POD -c contour contour cli lds

Which will stream changes to the LDS api endpoint to your terminal. Replace contour cli lds with contour cli rds for RDS, contour cli cds for CDS, and contour cli eds for EDS.

I've deployed on Minikube and nothing seems to work

Minikube is not recommended for testing or developing Contour because of its network limitations. To run Contour on Minikube for exploration only, see Contour on Minikube

How can I deploy a Contour daemonset directly onto ports 80 or 443?

To set envoy to run on port 80 and port 443, the following additional arguments may be passed into the contour command:

  command: ["contour"]
  args: 
  - serve
  - --incluster
  - --envoy-external-http-port=80
  - --envoy-external-https-port=443
  - --envoy-service-http-port=80
  - --envoy-service-https-port=443

See Issue #547