mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
Add load-balancing reverse-proxy documentation and examples
This commit is contained in:
parent
38e576b16b
commit
8a788bf32d
@ -1,315 +1,12 @@
|
||||
:lastproofread: 2023-01-27
|
||||
|
||||
.. _load-balancing:
|
||||
|
||||
WAN load balancing
|
||||
==================
|
||||
##############
|
||||
Load-balancing
|
||||
##############
|
||||
|
||||
Outbound traffic can be balanced between two or more outbound interfaces.
|
||||
If a path fails, traffic is balanced across the remaining healthy paths,
|
||||
a recovered path is automatically added back to the routing table and used by
|
||||
the load balancer. The load balancer automatically adds routes for each path to
|
||||
the routing table and balances traffic across the configured interfaces,
|
||||
determined by interface health and weight.
|
||||
.. toctree::
|
||||
:maxdepth: 1
|
||||
:includehidden:
|
||||
|
||||
|
||||
In a minimal configuration, the following must be provided:
|
||||
|
||||
* an interface with a nexthop
|
||||
* one rule with a LAN (inbound-interface) and the WAN (interface).
|
||||
|
||||
Let's assume we have two DHCP WAN interfaces and one LAN (eth2):
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health eth0 nexthop 'dhcp'
|
||||
set load-balancing wan interface-health eth1 nexthop 'dhcp'
|
||||
set load-balancing wan rule 1 inbound-interface 'eth2'
|
||||
set load-balancing wan rule 1 interface eth0
|
||||
set load-balancing wan rule 1 interface eth1
|
||||
|
||||
.. note::
|
||||
|
||||
WAN Load Balacing should not be used when dynamic routing protocol is
|
||||
used/needed. This feature creates customized routing tables and firewall
|
||||
rules, that makes it incompatible to use with routing protocols.
|
||||
|
||||
Balancing Rules
|
||||
---------------
|
||||
|
||||
Interfaces, their weight and the type of traffic to be balanced are defined in
|
||||
numbered balancing rule sets. The rule sets are executed in numerical order
|
||||
against outgoing packets. In case of a match the packet is sent through an
|
||||
interface specified in the matching rule. If a packet doesn't match any rule
|
||||
it is sent by using the system routing table. Rule numbers can't be changed.
|
||||
|
||||
Create a load balancing rule, it can be a number between 1 and 9999:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan rule 1
|
||||
Possible completions:
|
||||
description Description for this rule
|
||||
> destination Destination
|
||||
exclude Exclude packets matching this rule from wan load balance
|
||||
failover Enable failover for packets matching this rule from wan load balance
|
||||
inbound-interface Inbound interface name (e.g., "eth0") [REQUIRED]
|
||||
+> interface Interface name [REQUIRED]
|
||||
> limit Enable packet limit for this rule
|
||||
per-packet-balancing Option to match traffic per-packet instead of the default, per-flow
|
||||
protocol Protocol to match
|
||||
> source Source information
|
||||
|
||||
Interface weight
|
||||
****************
|
||||
|
||||
Let's expand the example from above and add weight to the interfaces.
|
||||
The bandwidth from eth0 is larger than eth1. Per default, outbound traffic is
|
||||
distributed randomly across available interfaces. Weights can be assigned to
|
||||
interfaces to influence the balancing.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule 1 interface eth0 weight 2
|
||||
set load-balancing wan rule 1 interface eth1 weight 1
|
||||
|
||||
66% of traffic is routed to eth0, eth1 gets 33% of traffic.
|
||||
|
||||
Rate limit
|
||||
**********
|
||||
|
||||
A packet rate limit can be set for a rule to apply the rule to traffic above or
|
||||
below a specified threshold. To configure the rate limiting use:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> limit <parameter>
|
||||
|
||||
* ``burst``: Number of packets allowed to overshoot the limit within ``period``.
|
||||
Default 5.
|
||||
* ``period``: Time window for rate calculation. Possible values:
|
||||
``second`` (one second), ``minute`` (one minute), ``hour`` (one hour).
|
||||
Default is ``second``.
|
||||
* ``rate``: Number of packets. Default 5.
|
||||
* ``threshold``: ``below`` or ``above`` the specified rate limit.
|
||||
|
||||
Flow and packet-based balancing
|
||||
*******************************
|
||||
|
||||
Outgoing traffic is balanced in a flow-based manner.
|
||||
A connection tracking table is used to track flows by their source address,
|
||||
destination address and port. Each flow is assigned to an interface according
|
||||
to the defined balancing rules and subsequent packets are sent through the
|
||||
same interface. This has the advantage that packets always arrive in order if
|
||||
links with different speeds are in use.
|
||||
|
||||
Packet-based balancing can lead to a better balance across interfaces when out
|
||||
of order packets are no issue. Per-packet-based balancing can be set for a
|
||||
balancing rule with:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> per-packet-balancing
|
||||
|
||||
Exclude traffic
|
||||
***************
|
||||
|
||||
To exclude traffic from load balancing, traffic matching an exclude rule is not
|
||||
balanced but routed through the system routing table instead:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> exclude
|
||||
|
||||
|
||||
Health checks
|
||||
-------------
|
||||
|
||||
The health of interfaces and paths assigned to the load balancer is
|
||||
periodically checked by sending ICMP packets (ping) to remote destinations,
|
||||
a TTL test or the execution of a user defined script. If an interface fails the
|
||||
health check it is removed from the load balancer's pool of interfaces.
|
||||
To enable health checking for an interface:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan interface-health <interface>
|
||||
Possible completions:
|
||||
failure-count Failure count
|
||||
nexthop Outbound interface nexthop address. Can be 'dhcp or ip address' [REQUIRED]
|
||||
success-count Success count
|
||||
+> test Rule number
|
||||
|
||||
Specify nexthop on the path to the destination, ``ipv4-address`` can be set to
|
||||
``dhcp``
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health <interface> nexthop <ipv4-address>
|
||||
|
||||
Set the number of health check failures before an interface is marked as
|
||||
unavailable, range for number is 1 to 10, default 1. Or set the number of
|
||||
successful health checks before an interface is added back to the interface
|
||||
pool, range for number is 1 to 10, default 1.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health <interface> failure-count <number>
|
||||
set load-balancing wan interface-health <interface> success-count <number>
|
||||
|
||||
Each health check is configured in its own test, tests are numbered and
|
||||
processed in numeric order. For multi target health checking multiple tests
|
||||
can be defined:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan interface-health eth1 test 0
|
||||
Possible completions:
|
||||
resp-time Ping response time (seconds)
|
||||
target Health target address
|
||||
test-script Path to user defined script
|
||||
ttl-limit Ttl limit (hop count)
|
||||
type WLB test type
|
||||
|
||||
* ``resp-time``: the maximum response time for ping in seconds.
|
||||
Range 1...30, default 5
|
||||
* ``target``: the target to be sent ICMP packets to, address can be an IPv4
|
||||
address or hostname
|
||||
* ``test-script``: A user defined script must return 0 to be considered
|
||||
successful and non-zero to fail. Scripts are located in /config/scripts,
|
||||
for different locations the full path needs to be provided
|
||||
* ``ttl-limit``: For the UDP TTL limit test the hop count limit must be
|
||||
specified. The limit must be shorter than the path length, an ICMP time
|
||||
expired message is needed to be returned for a successful test. default 1
|
||||
* ``type``: Specify the type of test. type can be ping, ttl or a user defined
|
||||
script
|
||||
|
||||
Source NAT rules
|
||||
----------------
|
||||
|
||||
Per default, interfaces used in a load balancing pool replace the source IP
|
||||
of each outgoing packet with its own address to ensure that replies arrive on
|
||||
the same interface. This works through automatically generated source NAT (SNAT)
|
||||
rules, these rules are only applied to balanced traffic. In cases where this
|
||||
behaviour is not desired, the automatic generation of SNAT rules can be
|
||||
disabled:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan disable-source-nat
|
||||
|
||||
Sticky Connections
|
||||
------------------
|
||||
Inbound connections to a WAN interface can be improperly handled when the reply
|
||||
is sent back to the client.
|
||||
|
||||
.. image:: /_static/images/sticky-connections.jpg
|
||||
:width: 80%
|
||||
:align: center
|
||||
|
||||
|
||||
Upon reception of an incoming packet, when a response is sent, it might be
|
||||
desired to ensure that it leaves from the same interface as the inbound one.
|
||||
This can be achieved by enabling sticky connections in the load balancing:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan sticky-connections inbound
|
||||
|
||||
Failover
|
||||
--------
|
||||
|
||||
In failover mode, one interface is set to be the primary interface and other
|
||||
interfaces are secondary or spare. Instead of balancing traffic across all
|
||||
healthy interfaces, only the primary interface is used and in case of failure,
|
||||
a secondary interface selected from the pool of available interfaces takes over.
|
||||
The primary interface is selected based on its weight and health, others become
|
||||
secondary interfaces. Secondary interfaces to take over a failed primary
|
||||
interface are chosen from the load balancer's interface pool, depending
|
||||
on their weight and health. Interface roles can also be selected based on rule
|
||||
order by including interfaces in balancing rules and ordering those rules
|
||||
accordingly. To put the load balancer in failover mode, create a failover rule:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <number> failover
|
||||
|
||||
Because existing sessions do not automatically fail over to a new path,
|
||||
the session table can be flushed on each connection state change:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan flush-connections
|
||||
|
||||
.. warning::
|
||||
|
||||
Flushing the session table will cause other connections to fall back from
|
||||
flow-based to packet-based balancing until each flow is reestablished.
|
||||
|
||||
Script execution
|
||||
----------------
|
||||
|
||||
A script can be run when an interface state change occurs. Scripts are run
|
||||
from /config/scripts, for a different location specify the full path:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan hook script-name
|
||||
|
||||
Two environment variables are available:
|
||||
|
||||
* ``WLB_INTERFACE_NAME=[interfacename]``: Interface to be monitored
|
||||
* ``WLB_INTERFACE_STATE=[ACTIVE|FAILED]``: Interface state
|
||||
|
||||
.. warning::
|
||||
|
||||
Blocking call with no timeout. System will become unresponsive if script
|
||||
does not return!
|
||||
|
||||
Handling and monitoring
|
||||
-----------------------
|
||||
|
||||
|
||||
Show WAN load balancer information including test types and targets.
|
||||
A character at the start of each line depicts the state of the test
|
||||
|
||||
* ``+`` successful
|
||||
* ``-`` failed
|
||||
* a blank indicates that no test has been carried out
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos:~$ show wan-load-balance
|
||||
Interface: eth0
|
||||
Status: failed
|
||||
Last Status Change: Tue Jun 11 20:12:19 2019
|
||||
-Test: ping Target:
|
||||
Last Interface Success: 55s
|
||||
Last Interface Failure: 0s
|
||||
# Interface Failure(s): 5
|
||||
|
||||
Interface: eth1
|
||||
Status: active
|
||||
Last Status Change: Tue Jun 11 20:06:42 2019
|
||||
+Test: ping Target:
|
||||
Last Interface Success: 0s
|
||||
Last Interface Failure: 6m26s
|
||||
# Interface Failure(s): 0
|
||||
|
||||
Show connection data of load balanced traffic:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos:~$ show wan-load-balance connection
|
||||
conntrack v1.4.2 (conntrack-tools): 3 flow entries have been shown.
|
||||
Type State Src Dst Packets Bytes
|
||||
tcp TIME_WAIT 10.1.1.13:38040 203.0.113.2:80 203.0.113.2 192.168.188.71
|
||||
udp 10.1.1.13:41891 198.51.100.3:53 198.51.100.3 192.168.188.71
|
||||
udp 10.1.1.13:55437 198.51.100.3:53 198.51.100.3 192.168.188.71
|
||||
|
||||
Restart
|
||||
*******
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
restart wan-load-balance
|
||||
wan
|
||||
reverse-proxy
|
||||
|
||||
289
docs/configuration/loadbalancing/reverse-proxy.rst
Normal file
289
docs/configuration/loadbalancing/reverse-proxy.rst
Normal file
@ -0,0 +1,289 @@
|
||||
|
||||
.. _load-balancing:
|
||||
|
||||
#############
|
||||
Reverse-proxy
|
||||
#############
|
||||
.. include:: /_include/need_improvement.txt
|
||||
|
||||
VyOS reverse-proxy is balancer and proxy server that provides
|
||||
high-availability, load balancing and proxying for TCP (level 4)
|
||||
and HTTP-based (level 7) applications.
|
||||
|
||||
Configuration
|
||||
=============
|
||||
|
||||
|
||||
Service configuration is responsible for binding to a specific port,
|
||||
while the backend configuration determines the type of load balancing
|
||||
to be applied and specifies the real servers to be utilized.
|
||||
|
||||
Service
|
||||
-------
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> listen-address
|
||||
<address>
|
||||
|
||||
Set service to bind on IP address, by default listen on any IPv4 and IPv6
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> port
|
||||
<port>
|
||||
|
||||
Create service `<name>` to listen on <port>
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> mode
|
||||
<tcp|http>
|
||||
|
||||
Configure service `<name>` mode TCP or HTTP
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> backend
|
||||
<name>
|
||||
|
||||
Configure service `<name>` to use the backend <name>
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> ssl
|
||||
certificate <name>
|
||||
|
||||
Set SSL certeficate <name> for service <name>
|
||||
|
||||
|
||||
Rules
|
||||
^^^^^
|
||||
Rules allow to control and route incoming traffic to specific backend based
|
||||
on predefined conditions. Rules allow to define matching criteria and
|
||||
perform action accordingly.
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> rule <rule>
|
||||
domain-name <name>
|
||||
|
||||
Match domain name
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> rule <rule>
|
||||
ssl <sni>
|
||||
|
||||
SSL match Server Name Indication (SNI) option:
|
||||
* ``req-ssl-sni`` SSL Server Name Indication (SNI) request match
|
||||
* ``ssl-fc-sni`` SSL frontend connection Server Name Indication match
|
||||
* ``ssl-fc-sni-end`` SSL frontend match end of connection Server Name
|
||||
Indication
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> rule <rule>
|
||||
url-path <match> <url>
|
||||
|
||||
Allows to define URL path matching rules for a specific service.
|
||||
|
||||
With this command, you can specify how the URL path should be matched
|
||||
against incoming requests.
|
||||
|
||||
The available options for <match> are:
|
||||
* ``begin`` Matches the beginning of the URL path
|
||||
* ``end`` Matches the end of the URL path.
|
||||
* ``exact`` Requires an exactly match of the URL path
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> rule <rule>
|
||||
set backend <name>
|
||||
|
||||
Assign a specific backend to a rule
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy service <name> rule <rule>
|
||||
redirect-location <url>
|
||||
|
||||
Redirect URL to a new location
|
||||
|
||||
|
||||
Backend
|
||||
-------
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> balance
|
||||
<balance>
|
||||
|
||||
Load-balancing algorithms to be used for distributind requests among the
|
||||
vailable servers
|
||||
|
||||
Balance algorithms:
|
||||
* ``source-address`` Distributes requests based on the source IP address
|
||||
of the client
|
||||
* ``round-robin`` Distributes requests in a circular manner,
|
||||
sequentially sending each request to the next server in line
|
||||
* ``least-connection`` Distributes requests tp tje server wotj the fewest
|
||||
active connections
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> mode
|
||||
<mode>
|
||||
|
||||
Configure backend `<name>` mode TCP or HTTP
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> parameters
|
||||
http-check
|
||||
|
||||
Enable layer 7 HTTP health check
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> server
|
||||
<name> address <x.x.x.x>
|
||||
|
||||
Set the address of the backend server to which the incoming traffic will
|
||||
be forwarded
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> server
|
||||
<name> port <port>
|
||||
|
||||
Set the address of the backend port
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> server
|
||||
<name> check
|
||||
|
||||
Active health check backend server
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> server
|
||||
<name> send-proxy
|
||||
|
||||
Send a Proxy Protocol version 1 header (text format)
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy backend <name> server
|
||||
<name> send-proxy-v2
|
||||
|
||||
Send a Proxy Protocol version 2 header (binary format)
|
||||
|
||||
|
||||
|
||||
Gloabal
|
||||
-------
|
||||
|
||||
Global parameters
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy global-parameters max-connections
|
||||
<num>
|
||||
|
||||
Limit maximum number of connections
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy global-parameters ssl-bind-ciphers
|
||||
<ciphers>
|
||||
|
||||
Limit allowed cipher algorithms used during SSL/TLS handshake
|
||||
|
||||
.. cfgcmd:: set load-balancing reverse-proxy global-parameters tls-version-min
|
||||
<version>
|
||||
|
||||
Specify the minimum required TLS version 1.2 or 1.3
|
||||
|
||||
|
||||
Redirect HTTP to HTTPS
|
||||
======================
|
||||
Configure the load-balancing reverse-proxy service for HTTP.
|
||||
|
||||
This configuration listen on port 80 and redirect incoming
|
||||
requests to HTTPS:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing reverse-proxy service http port '80'
|
||||
set load-balancing reverse-proxy service http redirect-http-to-https
|
||||
|
||||
The name of the service can be different, in this example it is only for
|
||||
convenience.
|
||||
|
||||
|
||||
Examples
|
||||
========
|
||||
|
||||
Level 4 balancing
|
||||
-----------------
|
||||
|
||||
This configuration enables the TCP reverse proxy for the "my-tcp-api" service.
|
||||
Incoming TCP connections on port 8888 will be load balanced across the backend
|
||||
servers (srv01 and srv02) using the round-robin load-balancing algorithm.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing reverse-proxy service my-tcp-api backend 'bk-01'
|
||||
set load-balancing reverse-proxy service my-tcp-api mode 'tcp'
|
||||
set load-balancing reverse-proxy service my-tcp-api port '8888'
|
||||
|
||||
set load-balancing reverse-proxy backend bk-01 balance 'round-robin'
|
||||
set load-balancing reverse-proxy backend bk-01 mode 'tcp'
|
||||
|
||||
set load-balancing reverse-proxy backend bk-01 server srv01 address '192.0.2.11'
|
||||
set load-balancing reverse-proxy backend bk-01 server srv01 port '8881'
|
||||
set load-balancing reverse-proxy backend bk-01 server srv02 address '192.0.2.12'
|
||||
set load-balancing reverse-proxy backend bk-01 server srv02 port '8882'
|
||||
|
||||
Balancing based on domain name
|
||||
------------------------------
|
||||
The following configuration demonstrates how to use VyOS
|
||||
to achieve load balancing based on the domain name.
|
||||
|
||||
The HTTP service listen on TCP port 80.
|
||||
|
||||
Rule 10 matches requests with the domain name ``node1.example.com`` forwards
|
||||
to the backend ``bk-api-01``
|
||||
|
||||
Rule 20 matches requests with the domain name ``node2.example.com`` forwards
|
||||
to the backend ``bk-api-02``
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing reverse-proxy service http description 'bind app listen on 443 port'
|
||||
set load-balancing reverse-proxy service http mode 'tcp'
|
||||
set load-balancing reverse-proxy service http port '80'
|
||||
|
||||
set load-balancing reverse-proxy service http rule 10 domain-name 'node1.example.com'
|
||||
set load-balancing reverse-proxy service http rule 10 set backend 'bk-api-01'
|
||||
set load-balancing reverse-proxy service http rule 20 domain-name 'node2.example.com'
|
||||
set load-balancing reverse-proxy service http rule 20 set backend 'bk-api-02'
|
||||
|
||||
set load-balancing reverse-proxy backend bk-api-01 description 'My API-1'
|
||||
set load-balancing reverse-proxy backend bk-api-01 mode 'tcp'
|
||||
set load-balancing reverse-proxy backend bk-api-01 server api01 address '127.0.0.1'
|
||||
set load-balancing reverse-proxy backend bk-api-01 server api01 port '4431'
|
||||
set load-balancing reverse-proxy backend bk-api-02 description 'My API-2'
|
||||
set load-balancing reverse-proxy backend bk-api-02 mode 'tcp'
|
||||
set load-balancing reverse-proxy backend bk-api-02 server api01 address '127.0.0.2'
|
||||
set load-balancing reverse-proxy backend bk-api-02 server api01 port '4432'
|
||||
|
||||
|
||||
Terminate SSL
|
||||
-------------
|
||||
The following configuration reverse-proxy terminate SSL.
|
||||
|
||||
The ``http`` service is lestens on port 80 and force redirects from HTTP to
|
||||
HTTPS.
|
||||
|
||||
The ``https`` service listens on port 443 with backend `bk-default` to
|
||||
handle HTTPS traffic. It uses certificate named ``cert`` for SSL termination.
|
||||
|
||||
Rule 10 matches requests with the exact URL path ``/.well-known/xxx``
|
||||
and redirects to location ``/certs/``.
|
||||
|
||||
Rule 20 matches requests with URL paths ending in ``/mail`` or exact
|
||||
path ``/email/bar`` redirect to location ``/postfix/``.
|
||||
|
||||
Additional global parameters are set, including the maximum number
|
||||
connection limit of 4000 and a minimum TLS version of 1.3.
|
||||
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing reverse-proxy service http description 'Force redirect to HTTPS'
|
||||
set load-balancing reverse-proxy service http port '80'
|
||||
set load-balancing reverse-proxy service http redirect-http-to-https
|
||||
|
||||
set load-balancing reverse-proxy service https backend 'bk-default'
|
||||
set load-balancing reverse-proxy service https description 'listen on 443 port'
|
||||
set load-balancing reverse-proxy service https mode 'http'
|
||||
set load-balancing reverse-proxy service https port '443'
|
||||
set load-balancing reverse-proxy service https ssl certificate 'cert'
|
||||
|
||||
set load-balancing reverse-proxy service https rule 10 url-path exact '/.well-known/xxx'
|
||||
set load-balancing reverse-proxy service https rule 10 set redirect-location '/certs/'
|
||||
set load-balancing reverse-proxy service https rule 20 url-path end '/mail'
|
||||
set load-balancing reverse-proxy service https rule 20 url-path exact '/email/bar'
|
||||
set load-balancing reverse-proxy service https rule 20 set redirect-location '/postfix/'
|
||||
|
||||
set load-balancing reverse-proxy backend bk-default description 'Default backend'
|
||||
set load-balancing reverse-proxy backend bk-default mode 'http'
|
||||
set load-balancing reverse-proxy backend bk-default server sr01 address '192.0.2.23'
|
||||
set load-balancing reverse-proxy backend bk-default server sr01 port '80'
|
||||
|
||||
set load-balancing reverse-proxy global-parameters max-connections '4000'
|
||||
set load-balancing reverse-proxy global-parameters tls-version-min '1.3'
|
||||
|
||||
315
docs/configuration/loadbalancing/wan.rst
Normal file
315
docs/configuration/loadbalancing/wan.rst
Normal file
@ -0,0 +1,315 @@
|
||||
:lastproofread: 2023-01-27
|
||||
|
||||
.. _load-balancing:
|
||||
|
||||
WAN load balancing
|
||||
==================
|
||||
|
||||
Outbound traffic can be balanced between two or more outbound interfaces.
|
||||
If a path fails, traffic is balanced across the remaining healthy paths,
|
||||
a recovered path is automatically added back to the routing table and used by
|
||||
the load balancer. The load balancer automatically adds routes for each path to
|
||||
the routing table and balances traffic across the configured interfaces,
|
||||
determined by interface health and weight.
|
||||
|
||||
|
||||
In a minimal configuration, the following must be provided:
|
||||
|
||||
* an interface with a nexthop
|
||||
* one rule with a LAN (inbound-interface) and the WAN (interface).
|
||||
|
||||
Let's assume we have two DHCP WAN interfaces and one LAN (eth2):
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health eth0 nexthop 'dhcp'
|
||||
set load-balancing wan interface-health eth1 nexthop 'dhcp'
|
||||
set load-balancing wan rule 1 inbound-interface 'eth2'
|
||||
set load-balancing wan rule 1 interface eth0
|
||||
set load-balancing wan rule 1 interface eth1
|
||||
|
||||
.. note::
|
||||
|
||||
WAN Load Balacing should not be used when dynamic routing protocol is
|
||||
used/needed. This feature creates customized routing tables and firewall
|
||||
rules, that makes it incompatible to use with routing protocols.
|
||||
|
||||
Balancing Rules
|
||||
---------------
|
||||
|
||||
Interfaces, their weight and the type of traffic to be balanced are defined in
|
||||
numbered balancing rule sets. The rule sets are executed in numerical order
|
||||
against outgoing packets. In case of a match the packet is sent through an
|
||||
interface specified in the matching rule. If a packet doesn't match any rule
|
||||
it is sent by using the system routing table. Rule numbers can't be changed.
|
||||
|
||||
Create a load balancing rule, it can be a number between 1 and 9999:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan rule 1
|
||||
Possible completions:
|
||||
description Description for this rule
|
||||
> destination Destination
|
||||
exclude Exclude packets matching this rule from wan load balance
|
||||
failover Enable failover for packets matching this rule from wan load balance
|
||||
inbound-interface Inbound interface name (e.g., "eth0") [REQUIRED]
|
||||
+> interface Interface name [REQUIRED]
|
||||
> limit Enable packet limit for this rule
|
||||
per-packet-balancing Option to match traffic per-packet instead of the default, per-flow
|
||||
protocol Protocol to match
|
||||
> source Source information
|
||||
|
||||
Interface weight
|
||||
****************
|
||||
|
||||
Let's expand the example from above and add weight to the interfaces.
|
||||
The bandwidth from eth0 is larger than eth1. Per default, outbound traffic is
|
||||
distributed randomly across available interfaces. Weights can be assigned to
|
||||
interfaces to influence the balancing.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule 1 interface eth0 weight 2
|
||||
set load-balancing wan rule 1 interface eth1 weight 1
|
||||
|
||||
66% of traffic is routed to eth0, eth1 gets 33% of traffic.
|
||||
|
||||
Rate limit
|
||||
**********
|
||||
|
||||
A packet rate limit can be set for a rule to apply the rule to traffic above or
|
||||
below a specified threshold. To configure the rate limiting use:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> limit <parameter>
|
||||
|
||||
* ``burst``: Number of packets allowed to overshoot the limit within ``period``.
|
||||
Default 5.
|
||||
* ``period``: Time window for rate calculation. Possible values:
|
||||
``second`` (one second), ``minute`` (one minute), ``hour`` (one hour).
|
||||
Default is ``second``.
|
||||
* ``rate``: Number of packets. Default 5.
|
||||
* ``threshold``: ``below`` or ``above`` the specified rate limit.
|
||||
|
||||
Flow and packet-based balancing
|
||||
*******************************
|
||||
|
||||
Outgoing traffic is balanced in a flow-based manner.
|
||||
A connection tracking table is used to track flows by their source address,
|
||||
destination address and port. Each flow is assigned to an interface according
|
||||
to the defined balancing rules and subsequent packets are sent through the
|
||||
same interface. This has the advantage that packets always arrive in order if
|
||||
links with different speeds are in use.
|
||||
|
||||
Packet-based balancing can lead to a better balance across interfaces when out
|
||||
of order packets are no issue. Per-packet-based balancing can be set for a
|
||||
balancing rule with:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> per-packet-balancing
|
||||
|
||||
Exclude traffic
|
||||
***************
|
||||
|
||||
To exclude traffic from load balancing, traffic matching an exclude rule is not
|
||||
balanced but routed through the system routing table instead:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <rule> exclude
|
||||
|
||||
|
||||
Health checks
|
||||
-------------
|
||||
|
||||
The health of interfaces and paths assigned to the load balancer is
|
||||
periodically checked by sending ICMP packets (ping) to remote destinations,
|
||||
a TTL test or the execution of a user defined script. If an interface fails the
|
||||
health check it is removed from the load balancer's pool of interfaces.
|
||||
To enable health checking for an interface:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan interface-health <interface>
|
||||
Possible completions:
|
||||
failure-count Failure count
|
||||
nexthop Outbound interface nexthop address. Can be 'dhcp or ip address' [REQUIRED]
|
||||
success-count Success count
|
||||
+> test Rule number
|
||||
|
||||
Specify nexthop on the path to the destination, ``ipv4-address`` can be set to
|
||||
``dhcp``
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health <interface> nexthop <ipv4-address>
|
||||
|
||||
Set the number of health check failures before an interface is marked as
|
||||
unavailable, range for number is 1 to 10, default 1. Or set the number of
|
||||
successful health checks before an interface is added back to the interface
|
||||
pool, range for number is 1 to 10, default 1.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan interface-health <interface> failure-count <number>
|
||||
set load-balancing wan interface-health <interface> success-count <number>
|
||||
|
||||
Each health check is configured in its own test, tests are numbered and
|
||||
processed in numeric order. For multi target health checking multiple tests
|
||||
can be defined:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos# set load-balancing wan interface-health eth1 test 0
|
||||
Possible completions:
|
||||
resp-time Ping response time (seconds)
|
||||
target Health target address
|
||||
test-script Path to user defined script
|
||||
ttl-limit Ttl limit (hop count)
|
||||
type WLB test type
|
||||
|
||||
* ``resp-time``: the maximum response time for ping in seconds.
|
||||
Range 1...30, default 5
|
||||
* ``target``: the target to be sent ICMP packets to, address can be an IPv4
|
||||
address or hostname
|
||||
* ``test-script``: A user defined script must return 0 to be considered
|
||||
successful and non-zero to fail. Scripts are located in /config/scripts,
|
||||
for different locations the full path needs to be provided
|
||||
* ``ttl-limit``: For the UDP TTL limit test the hop count limit must be
|
||||
specified. The limit must be shorter than the path length, an ICMP time
|
||||
expired message is needed to be returned for a successful test. default 1
|
||||
* ``type``: Specify the type of test. type can be ping, ttl or a user defined
|
||||
script
|
||||
|
||||
Source NAT rules
|
||||
----------------
|
||||
|
||||
Per default, interfaces used in a load balancing pool replace the source IP
|
||||
of each outgoing packet with its own address to ensure that replies arrive on
|
||||
the same interface. This works through automatically generated source NAT (SNAT)
|
||||
rules, these rules are only applied to balanced traffic. In cases where this
|
||||
behaviour is not desired, the automatic generation of SNAT rules can be
|
||||
disabled:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan disable-source-nat
|
||||
|
||||
Sticky Connections
|
||||
------------------
|
||||
Inbound connections to a WAN interface can be improperly handled when the reply
|
||||
is sent back to the client.
|
||||
|
||||
.. image:: /_static/images/sticky-connections.jpg
|
||||
:width: 80%
|
||||
:align: center
|
||||
|
||||
|
||||
Upon reception of an incoming packet, when a response is sent, it might be
|
||||
desired to ensure that it leaves from the same interface as the inbound one.
|
||||
This can be achieved by enabling sticky connections in the load balancing:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan sticky-connections inbound
|
||||
|
||||
Failover
|
||||
--------
|
||||
|
||||
In failover mode, one interface is set to be the primary interface and other
|
||||
interfaces are secondary or spare. Instead of balancing traffic across all
|
||||
healthy interfaces, only the primary interface is used and in case of failure,
|
||||
a secondary interface selected from the pool of available interfaces takes over.
|
||||
The primary interface is selected based on its weight and health, others become
|
||||
secondary interfaces. Secondary interfaces to take over a failed primary
|
||||
interface are chosen from the load balancer's interface pool, depending
|
||||
on their weight and health. Interface roles can also be selected based on rule
|
||||
order by including interfaces in balancing rules and ordering those rules
|
||||
accordingly. To put the load balancer in failover mode, create a failover rule:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan rule <number> failover
|
||||
|
||||
Because existing sessions do not automatically fail over to a new path,
|
||||
the session table can be flushed on each connection state change:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan flush-connections
|
||||
|
||||
.. warning::
|
||||
|
||||
Flushing the session table will cause other connections to fall back from
|
||||
flow-based to packet-based balancing until each flow is reestablished.
|
||||
|
||||
Script execution
|
||||
----------------
|
||||
|
||||
A script can be run when an interface state change occurs. Scripts are run
|
||||
from /config/scripts, for a different location specify the full path:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set load-balancing wan hook script-name
|
||||
|
||||
Two environment variables are available:
|
||||
|
||||
* ``WLB_INTERFACE_NAME=[interfacename]``: Interface to be monitored
|
||||
* ``WLB_INTERFACE_STATE=[ACTIVE|FAILED]``: Interface state
|
||||
|
||||
.. warning::
|
||||
|
||||
Blocking call with no timeout. System will become unresponsive if script
|
||||
does not return!
|
||||
|
||||
Handling and monitoring
|
||||
-----------------------
|
||||
|
||||
|
||||
Show WAN load balancer information including test types and targets.
|
||||
A character at the start of each line depicts the state of the test
|
||||
|
||||
* ``+`` successful
|
||||
* ``-`` failed
|
||||
* a blank indicates that no test has been carried out
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos:~$ show wan-load-balance
|
||||
Interface: eth0
|
||||
Status: failed
|
||||
Last Status Change: Tue Jun 11 20:12:19 2019
|
||||
-Test: ping Target:
|
||||
Last Interface Success: 55s
|
||||
Last Interface Failure: 0s
|
||||
# Interface Failure(s): 5
|
||||
|
||||
Interface: eth1
|
||||
Status: active
|
||||
Last Status Change: Tue Jun 11 20:06:42 2019
|
||||
+Test: ping Target:
|
||||
Last Interface Success: 0s
|
||||
Last Interface Failure: 6m26s
|
||||
# Interface Failure(s): 0
|
||||
|
||||
Show connection data of load balanced traffic:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
vyos@vyos:~$ show wan-load-balance connection
|
||||
conntrack v1.4.2 (conntrack-tools): 3 flow entries have been shown.
|
||||
Type State Src Dst Packets Bytes
|
||||
tcp TIME_WAIT 10.1.1.13:38040 203.0.113.2:80 203.0.113.2 192.168.188.71
|
||||
udp 10.1.1.13:41891 198.51.100.3:53 198.51.100.3 192.168.188.71
|
||||
udp 10.1.1.13:55437 198.51.100.3:53 198.51.100.3 192.168.188.71
|
||||
|
||||
Restart
|
||||
*******
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
restart wan-load-balance
|
||||
Loading…
x
Reference in New Issue
Block a user