Contour v0.8.0
Heptio is proud to present version 0.8 of Contour, our Envoy powered Kubernetes Ingress Controller.
New and improved
Contour 0.8 includes early support for TCP proxying of TLS encrypted traffic. Currently, TCP sessions must be encrypted with TLS. This is necessary so that Envoy can use SNI to route the incoming request to the correct service.
Here is an example IngressRoute document showing the TCP proxying in action:
apiVersion: contour.heptio.com/v1beta1
kind: IngressRoute
metadata:
name: example
namespace: default
spec:
virtualhost:
fqdn: tcp.example.com
tls:
secretName: secret
tcpproxy:
services:
- name: tcpservice
port: 8080
- name: otherservice
port: 9999
weight: 20
routes:
- match: /
services:
- name: kuard
port: 80
Please consult the IngressRoute documentation for more information.
Improvements to this feature we continue throughout the 0.8 and 0.9 series.
Bug fixes
- The missing Service definition for the
deployment/ds-host-net
example has been re-added.