Skip to main content
Connect the balancer
Last update:

Connect the balancer

  1. Create a global router.

  2. Connect networks and subnets to the global router to each VLAN and cloud platform project where the servers for balancing reside.

    For VMware-based clouds You can only add networks and subnets via technical support.

  3. Assign IP addresses from subnets to servers.

  4. Configure routing to the balancer subnet.

  5. Order a balancer.

  6. Check the operation of the balancer.

Create a global router

  1. В control panels go to Network servicesSelectel Global Router.
  2. Click Create a router. Each account is set limit to five global routers.
  3. Enter the name of the router.
  4. Click Create.
  5. If the router was created with status ERROR or hovered in one of the statuses, file a ticket.

Connect networks and subnets to the global router

carefully

When creating a network, do not use subnet addresses on servers 10.128.0.0/16. This subnet hosts load balancers, its use can cause load balancers to fail.

Use for a dedicated or hosted server.

You can connect a new network to the router or an existing network if it is not already connected to any of the account's global routers.

  1. В control panels go to Network servicesSelectel Global Router.

  2. Open the router page → tab Networks.

  3. Click Create a network.

  4. Enter a network name, this will only be used in the control panel.

  5. Select a service Dedicated servers.

  6. Select pool.

  7. Select VLAN. If you want to create a network up to the internal segment (Q-in-Q), specify its tag, a number from 2 to 4094. If there is already a network up to the VLAN, be sure to specify the Q-in-Q segment of this VLAN.

  8. Enter the subnet name — this will only be used in the control panel.

  9. Enter the CIDR — IP address and private subnet mask. You can enter a new subnet or an existing private subnet of the server if it is not already added to any of the global routers in the account. The subnet must meet the conditions:

    • belong to the RFC 1918 private address range: 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16;
    • have a size of at least /29, as three addresses will be occupied by Selectel network equipment;
    • Do not overlap with other subnets added to this router: The IP addresses of each subnet on the router must not overlap with the IP addresses of other subnets on the router;
    • If Managed Kubernetes nodes will be included in the global router network, the subnet must not overlap with the ranges 10.250.0.0/16, 10.10.0.0/16 и 10.96.0.0/12. These subnets participate in the internal addressing of Managed Kubernetes, their use may cause conflicts in the global router network.
  10. If you have specified a Q-in-Q tag, make sure to set up a Q-in-Q. When configuring, use the subnet you specified in step 9.

  11. Enter the gateway IP or leave the first address from the subnet assigned by default. Do not assign this address to your devices to avoid disrupting the network.

  12. Enter service IPs or leave the last addresses from the subnet assigned by default. Do not assign these addresses to your devices to avoid disrupting the network.

  13. Click Create a network.

  14. Optional: check the network topology on the global router. В control panels go to Network servicesSelectel Global Router. Open the page of the desired router and click Network map.

assign IP addresses to the servers

On each server that joins the global router network, configure a local port to work with the subnet created on the router. On the port, assign an IP address from a private subnet that you plugged into a global router for the corresponding VLAN or project.

  1. Connect to the server via SSH or through KVM console.

  2. Open the utility configuration file netplan with the vi text editor:

    vi /etc/netplan/01-netcfg.yaml
  3. Add or change values for the network interface settings of the private network:

        <eth_name>:
    addresses: [<ip_address>/<mask>]

    Specify:

    • <eth_name> — name of the network interface of the private network;
    • <ip_address>/<mask> — The private IP address of the server with a subnet mask, for example, 192.168.0.2/29.
  4. Press the key ESC.

  5. Exit the text editor vi with the changes intact:

    :wq
  6. Apply the configuration:

    netplan apply
  7. Optional: reboot the server.

Configure routing to the balancer subnet

On each of the servers we need to pre-configure routing to the subnet in which we will place the balancer when connecting the service. By default, we place the balancers in the subnet 10.128.0.0/16but you can choose any suitable subnet of dimensionality /16.

  1. Connect to the server.

  2. Open the network configuration file:

    vi /etc/netplan/01-netcfg.yaml
  3. At the end of the data block of the desired network interface, add a route:

    routes:
    - to: <ip_address>/<mask>
    via: <gateway>

    Specify:

    • <ip_address>/<mask> — balancer subnet. You can specify the subnet 10.128.0.0/16in which we place the balancers by default, or any suitable subnet of dimensionality /16;
    • <gateway> — The IP address from the subnet of the server that you assigned as the gateway to the global router at connecting networks and subnets.
  4. Save the file.

  5. Check the settings:

    sudo netplan try
  6. Apply the changes:

    netplan apply

Order a balancer

  1. If your servers use the HTTPS protocol, add your TLS(SSL) certificate to the secret manager. You can also issue a Let's Encrypt® certificate.

  2. В control panels go to Network servicesFault-tolerant load balancer.

  3. Click Connect the balancer.

  4. Select the tariff according to the desired channel width — 20, 50, 100 or 1 000 Mbps. If you need a different channel width, select Other and specify the required value in Mbps.

  5. Specify the global router to which you are connected networks and subnets — its name, ID, or a list of subnets added to the router. You can view the router data in control panels under Network servicesGlobal router → router page.

  6. Specify the balancer subnet you specified when you routing setup on the servers.

  7. Select a balancing algorithm:

    • Round Robin is a round robin algorithm in which requests are passed to each server in turn;
    • Weighted Round Robin is a weighted round robin algorithm in which each server is assigned a weighting factor corresponding to its performance and capacity. Servers with a higher weighting factor receive more requests;
    • Source IP hash is an algorithm that, depending on the HTTP header or IP address, selects a preferred server to receive the request;
    • Least Connections — an algorithm that sends the request to the least loaded server.
  8. If you want to use Sticky Sessions, check the checkbox Sticky Sessions.

  9. Select the protocol of the target servers: TCP, HTTP, HTTPS.

  10. If you selected the TCP protocol, specify the parameters for using the protocol — all private IP addresses assigned within the global router's networks, with the ports specified.

  11. If you selected the HTTP protocol, specify all combinations of URLs received from the Internet and the IP addresses to which they should be redirected, including the port. For example, http://domain.com/page — http://X.X.X.X:X.

  12. If you selected the HTTPS protocol, specify:

    • all combinations of URLs received from the Internet and the IP addresses to which they should be redirected, specifying the port. For example, https://domain.com/page — http://X.X.X.X:X;
    • The ID of the certificate you added in step 1. The ID can be viewed in control panels: section Cloud platformThe manager of secrets → tab Certificates → in the menu of the certificate, select Copy UUID;
    • ID projects where the certificate is located.
  13. Optional: if you need to specify any additional data, enter it in the field Additional comment. For example, elaborate on the use case scenario, specify in which poolahs infrastructure is placed, leave an admin contact to get in touch and clarify details.

  14. Click Connect the balancer.

  15. We'll create and ship ticket to activate the service. Connection takes up to seven working days. When the balancer is ready, we will send you a secure public IP address in a ticket to which you should direct incoming traffic for balancing.

Check the operation of the balancer

To test the balancer's performance, send test requests to the IP address you received at the ordering a balancer.