AWS Load Balancer Specific Settings
Deploying a Network Load Balancer
The Network Load Balancer (NLB) forwards incoming traffic to instances registered in the target group. NLB can be made redundant across multiple Availability Zones (AZs). In this case, NLB IP addresses are assigned to each subnet and cannot be used for client access. Therefore, you need to use the DNS name of the NLB for client access. Since the DNS name of the NLB is converted to one of the IP addresses, you can access the client using the same DNS name even when an AZ fails. By default, traffic forwarded to an NLB IP address can only be forwarded to targets on that subnet. By enabling cross-zone load balancing, it can be forwarded to targets in different subnets.
Connecting from the client
- The Client attempts to connect to the application (Listener in the above figure) with the NLB DNS name and the port number of the application (XXXX-nlb1-YYYYY.elb.region.amazonaws.com and 1521 in the above figure). The DNS name is converted to the IP address of the NLB subnet via AWS internal Route 53 (10.0.1.151 or 10.0.2.181 in the above example).
- The NLB registers the target group to which it should forward specific protocols and ports. At this time, check on which node responds to the health probe.
- The active node responds to health probes. With LifeKeeper, LB Health Check resource is active on only one instance, so only the active node responds to the NLB health probe, meaning that the NLB will always forward traffic only to the active node (in the figure above, AWSNODE1 is active).
- The NLB forwards connection requests from clients to the active node. The connection request then reaches the active node with the destination address replaced from the NLB address to the active node’s real IP address (10.0.1.10 in the figure above).
Creating a Network Load Balancer
Create a network load balancer according to the following table.
Network Load Balancer | |
---|---|
Load balancer name | Any |
Scheme | Internal |
IP address type | IPv4 |
Network mapping | Select the subnet of the AZ where the cluster node resides |
Security group | Allow communication with registered targets on both listener and the health check port |
Listener | Select the listener port with protocol TCP. 1521 for Oracle, 5432 for PostgreSQL. Then select the target group to forward. |
Target Group | |
---|---|
Target type | Instance |
Protocol: Port | Specify the port to be forwarded for TCP and port, e.g. 1521 for Oracle, 5432 for PostgreSQL. |
IP address type | IPv4 |
Health check protocol | TCP |
Health check details | Health check port Overwrite: <Port specified in LB Health Check Kit> Healthy threshold: 2 Unhealthy threshold: 3 Timeout: 5 seconds Interval: 10 seconds |
Available instance | Select cluster nodes to be forwarded |
Port of the selected instance | Specifies the port to be forwarded, e.g. 1521 for Oracle, 5432 for PostgreSQL |
Enabling cross-zone load balancing
Cross-zone load balancing is disabled by default, so enable it from “Edit load balancer attributes”.
Tuning parameters configured in health check details
See Tuning Load Balancer Health Check Parameters.
Creating IP Resources
When using a resource that requires an IP resource, such as an Oracle resource, create an IP resource as a real IP address. Traffic is forwarded from the NLB to the real IP address.
Post your comment on this topic.