As mentioned earlier, load balancer rule decides how the traffic should be routed from the front-end pool to the backend pool. In other words, without the load balancer rules, the traffic that hits the front end will never reach the backend pool.
Front-end IP and port numbers are mapped to the backend IP addresses and ports using the load balancer rules. The backend pool, front-end IP address, and health probe are required before setting the load balancer rule. Load balancer rules can be also leveraged to facilitate remote access to the backend virtual machines. For example, you could map the front-end IP and a port number to the backend VM and RDP port for RDP access.
You will get to know more about the load balancing rule when you deploy the load balancer in Exercise 5.1.
Session Persistence
The load balancer will distribute the traffic equally among the backend servers, which is the default behavior. A five-tuple hash is used by the load balancer to spread the traffic to the available servers in the backend. The five tuple hash includes the source IP, source port, destination IP, destination port, and protocol. Session persistence specifies how the traffic from the client should be routed and which backend server will serve the request.
You have three distribution modes available in the load balancer to handle session persistence.
- None/five tuple: This is the default value, and any virtual machine can handle the incoming requests. Since the five tuples include the source port in the hash, clients may get redirected to different back-end servers for each session.
- Client IP/source IP affinity/two-tuple hash: Requests coming from the same source IP address will be handled by the same backend server. Here the hash between the source IP and the destination IP is used to map the backend servers.
- Client IP and protocol/three-tuple hash: Successive requests from the same client IP address and protocol will be handled by the same backend virtual machine. In a three-tuple hash, you are taking the hash of the source IP, destination IP, and protocol to map the servers.
The selection of the distribution mode is based on the application requirements. In some applications, you may require storing the logged-in user’s profile. In this scenario, you need to use a client IP distribution mode. This will help the user to get redirected to the same server where they are logged in.
Now that you are familiar with the terminologies, it’s time that you deploy a load balancer and distribute the traffic.
Leave a Reply