Selector: app=envoy,kapp.k14s.io/app=<ID>Type: LoadBalancerIP Family Policy: SingleStackIP Families: IPv4IP: <IP>IPs: <IP>LoadBalancer Ingress: <external-ip>Port: http 80/TCPTargetPort: 8080/TCPNodePort: http 31247/TCPEndpoints: <IP>:8080,<IP>:8080Port: https 443/TCPTargetPort: 8443/TCPNodePort: https 32259/TCPEndpoints: <IP>:8443,<IP>:8443Session Affinity: NoneExternal Traffic Policy: ClusterEvents:
Proto Recv-Q Send-Q Local Address Foreign Address Statetcp 0 0 127.0.0.1:9001 0.0.0.0:* LISTENtcp 0 0 0.0.0.0:8090 0.0.0.0:* LISTENtcp 0 0 0.0.0.0:8002 0.0.0.0:* LISTENtcp 0 0 10.244.0.83:32928 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:32916 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:54646 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:38094 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:40788 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:38078 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:40774 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:38064 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:38706 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:39652 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:40800 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:39660 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:39746 10.96.2.71:8001 ESTABLISHEDtcp 0 0 10.244.0.83:38692 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:32930 10.244.0.83:8002 TIME_WAITtcp 0 0 10.244.0.83:54650 10.244.0.83:8002 TIME_WAITVMware vSphere Kubernetes Service
This is an intended contour behaviour.
In a default installation, contour is intelligent enough to know that if there are no routing rules defined in the cluster, it technically has "nothing to do." To save resources and maintain security, it does not instruct Envoy to open the 8080/8443 ports until a valid route exists. Envoy listeners are created on-demand.
To wake up the Envoy listeners, a dummy routing object can be applied to the cluster.
For example, apply a basic HTTPProxy object (for port 8080) and HTTPSProxy (for port 8443). Even if the backend service is invalid or non-existent, the presence of the object triggers Contour to instruct envoy to open these ports.
Per Virtual services of Contour in AVI is down, you can also deploy Harbor with Supervisor service which will use the Contour Ingress. The same should also lead to the relevant port getting opened on the envoy end.