You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -25,6 +25,8 @@ There are two main ways to scale an application to increase the performance and
25
25
26
26
## Additional Features
27
27
28
+
-**Firewall Security:**[Cloud Firewall](/docs/products/networking/cloud-firewall/) provides enhanced security by allowing you to control who can access your NodeBalancer. The optional Cloud Firewall sits between your NodeBalancer and the internet to filter out unwanted network traffic before it reaches your NodeBalancer. When used in conjunction with NodeBalancers, a Cloud Firewall’s inbound rules only apply to the NodeBalancer’s public IP, not the IPs of the backend nodes. This means you may also want to add individual backend nodes to a Cloud Firewall to protect any additional exposed IP addresses.
29
+
28
30
-**Managed:** NodeBalancers take the infrastructure management out of load balancing. They are designed to be maintenance free after initial configuration.
29
31
30
32
-**Sticky Sessions:** NodeBalancers can route subsequent requests to the same backend, so all application sessions work correctly.
@@ -53,6 +55,8 @@ NodeBalancers are available across [all regions](https://www.linode.com/global-i
53
55
54
56
Each NodeBalancer on an account starts at $10/mo ($0.015/hr). [Price](https://www.linode.com/pricing/) may vary by region.
55
57
58
+
Cloud Firewall is available at no additional charge to customers.
59
+
56
60
## Technical Specifications
57
61
58
62
- Managed cloud-based load balancing service
@@ -63,6 +67,7 @@ Each NodeBalancer on an account starts at $10/mo ($0.015/hr). [Price](https://ww
63
67
- Supports HTTP and HTTPS (layer 7) load balancing through the HTTP/1.1 protocol (HTTP/2 is not yet available)
64
68
- Supports both SSL termination (using the HTTPS protocol mode) and SSL pass-through (using the TCP protocol mode)
65
69
- Equipped with both public IPv4 and IPv6 addresses
70
+
- Supports inbound Cloud Firewall rules such as IPv4 and IPv6 access control lists (ACLs) to *Accept* or *Drop* ingress traffic.
66
71
- Fully customizable health checks to ensure traffic lands on a functioning backend
67
72
- 40 Gbps inbound network bandwidth
68
73
- Free inbound network transfer
@@ -81,4 +86,10 @@ Each NodeBalancer on an account starts at $10/mo ($0.015/hr). [Price](https://ww
81
86
-**TLS protocols:** TLS v1.2 and v1.3 are supported in **HTTPS** mode.
82
87
- While operating in **HTTPS** mode, internal traffic sent to the backend Linodes will be unencrypted.
83
88
84
-
For applications that require a very high connection rate or otherwise need to overcome the above considerations present in **HTTPS** mode, consider operating in **TCP** mode and terminating TLS on the backend Linodes.
89
+
For applications that require a very high connection rate or otherwise need to overcome the above considerations present in **HTTPS** mode, consider operating in **TCP** mode and terminating TLS on the backend Linodes.
90
+
91
+
-**Cloud Firewall support:** When a Cloud Firewall is assigned to a NodeBalancer, the firewall only looks at incoming requests, this means that only inbound Cloud Firewall rules apply and outbound rules are not applicable.
92
+
93
+
{{< note >}}
94
+
A service (Linode) can be accessed from other interfaces (not just the NodeBalancer). To filter traffic from other interfaces, backend Linodes require their own firewalls.
Copy file name to clipboardExpand all lines: docs/products/networking/nodebalancers/get-started/index.md
+20-2Lines changed: 20 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,15 +35,33 @@ For advice on load balancing and high availability, review the following resourc
35
35
36
36
## Create the NodeBalancer
37
37
38
+
If you are using a Cloud Firewall with this NodeBalancer, have the name of the firewall available. To see a listing of available firewalls, log in to the [Cloud Manager](https://cloud.linode.com) and select **Firewalls** from the navigation menu. If the firewall doesn't exist yet, [Create a Cloud Firewall](/docs/products/networking/cloud-firewall/guides/create-a-cloud-firewall/) and [Add Firewall Rules](/docs/products/networking/cloud-firewall/guides/manage-firewall-rules/).
39
+
38
40
Once your application has been deployed on multiple Compute Instances, you are ready to create the NodeBalancer. Simple instructions have been provided below. For complete instructions, see the [Create a NodeBalancer](/docs/products/networking/nodebalancers/guides/create/) guide.
39
41
40
-
1. Log in to the [Cloud Manager](https://cloud.linode.com), select NodeBalancers from the left menu, and click the **Create Nodebalancer** button. This displays the *NodeBalancer Create* form.
42
+
1. Log in to [Cloud Manager](https://cloud.linode.com), select **NodeBalancers** from the left menu, and click the **Create NodeBalancer** button. This displays the *Nodebalancers Create* form.
41
43
42
44
1. Enter a **Label** for the NodeBalancer, as well as any **Tags** that may help you organize this new NodeBalancer with other services on your account.
43
45
44
46
1. Select a **Region** for this NodeBalancer. The NodeBalancer needs to be located in the same data center as your application's Compute Instances.
45
47
46
-
1. Within the *NodeBalancer Settings* area, there is a single configuration block with sections for configuring the port, defining health checks, and attaching backend nodes. Additional ports can be added using the **Add another Configuration** button.
48
+
1. If you are using a firewall, select a firewall from the **Assign Firewall** list. Only one Firewall can be selected, however you can attach the same Cloud Firewall to multiple NodeBalancers or other services (devices).
49
+
50
+
You can also create a new Firewall by clicking the **Create Firewall** button. This displays the *Create Firewall* drawer. Configure the required field.
51
+
52
+
|**Configuration**|**Description**|
53
+
| --------------- | --------------- |
54
+
|**Label** (Required)| The label is used as an identifier for this Cloud Firewall. |
55
+
|**Additional Linodes** (Optional)| The Linode(s) on which to apply this Firewall. A list of all Linodes on your account are visible. You can leave this blank if you do not yet wish to apply the Firewall to a Linode. |
56
+
|**Additional NodeBalancers** (Optional) | The NodeBalancers on which to apply this Firewall. A list of all created NodeBalancers on your account are visible. You can leave this blank if you do not want to apply this Cloud Firewall to other NodeBalancers.|
57
+
58
+
Click on the **Create Firewall** button to finish creating the Cloud Firewall and to returned to the the *Nodebalancers Create* form.
59
+
60
+
{{< note >}}
61
+
By default, a new Cloud Firewall accepts all inbound and outbound connections. Only inbound firewall rules apply to NodeBalancers, see [Cloud Firewall Inbound Rules for NodeBalancer](/docs/products/networking/nodebalancers/guides/create/#cloud-firewall-inbound-rules-for-nodebalancer). Custom rules can be added as needed in the Firewall application. See [Add New Cloud Firewall Rules](/docs/products/networking/cloud-firewall/guides/manage-firewall-rules/).
62
+
{{< /note >}}
63
+
64
+
5. Within the *NodeBalancer Settings* area, there is a single configuration block with sections for configuring the port, defining health checks, and attaching backend nodes. Additional ports can be added using the **Add another Configuration** button.
47
65
48
66
{{< note >}}
49
67
The following recommended parameters can be used for deploying a website. For other applications or to learn more about these settings, see the [Configuration Options](/docs/products/networking/nodebalancers/guides/configure/) guide.
Copy file name to clipboardExpand all lines: docs/products/networking/nodebalancers/guides/client-ip/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ You'll need to configure your web server software to use the XFF header.
20
20
21
21
### Apache
22
22
23
-
If you're using the Apache web server, you can use the `mod_rpaf` to replace `REMOTE_ADDR` with the clent's IP address in the XFF header. After you install the module, you'll need to specify 192.168.255.0/24 as a proxy in `httpd.conf`.
23
+
If you're using the Apache web server, you can use the `mod_rpaf` to replace `REMOTE_ADDR` with the client's IP address in the XFF header. After you install the module, you'll need to specify 192.168.255.0/24 as a proxy in `httpd.conf`.
Copy file name to clipboardExpand all lines: docs/products/networking/nodebalancers/guides/configure/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ The *algorithm* controls how *new connections* are allocated across the backend
61
61
62
62
-**Least Connections**: Tracks each backend's connection count and allocates new connections to the one with the least connections.
63
63
64
-
-**Source IP**: Modulates the client's IP to allocate them to the same backend on subsequent requests. This works so long as the set of backend doesn't change, however the **Session Stickiness** setting (below) does affect this behavior.
64
+
-**Source IP**: Modulates the client's IP to allocate them to the same backend on subsequent requests. This works so long as the set of backend nodes doesn't change, however the **Session Stickiness** setting (below) does affect this behavior.
Copy file name to clipboardExpand all lines: docs/products/networking/nodebalancers/guides/create/index.md
+36-1Lines changed: 36 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ This guide walks you through creating a NodeBalancer through the Cloud Manager.
11
11
1.[Open the Create NodeBalancer Form in the Cloud Manager](#open-the-create-nodebalancer-form-in-the-cloud-manager)
12
12
1.[Set the Label](#set-the-label)
13
13
1.[Select a Region](#select-a-region)
14
+
1.[Assign a Cloud Firewall](#assign-a-cloud-firewall-optional)
14
15
1.[Add and Configure Ports](#add-and-configure-ports)
15
16
1.[Set Up Health Checks for Each Port](#set-up-health-checks-for-each-port)
16
17
1.[Add Backend Nodes to Each Port](#add-backend-nodes-to-each-port)
@@ -32,9 +33,43 @@ Select the **region** where the NodeBalancer will reside. Regions correspond wit
32
33
-[Speed Tests for Data Centers](https://www.linode.com/speed-test/)
33
34
-[How to Choose a Data Center](/docs/products/platform/get-started/guides/choose-a-data-center/)
34
35
36
+
## Assign a Cloud Firewall (Optional)
37
+
38
+
A NodeBalancer can only be attached to one active (enabled) Cloud Firewall at a time. You can attach the same Cloud Firewall to multiple NodeBalancers or other devices.
39
+
40
+
Select the Cloud Firewall from the **Assign Firewall** pull down to use with the NodeBalancer.
41
+
42
+
If the firewall doesn't exist yet, you can create the firewall using either the Firewall application, or the NodeBalancer application. Rules for the firewall, can only be added in the Firewall application.
43
+
44
+
To create a firewall and add rules using the Firewall application, see [Create a Cloud Firewall](/docs/products/networking/cloud-firewall/guides/create-a-cloud-firewall/) and [Add Firewall Rules](/docs/products/networking/cloud-firewall/guides/manage-firewall-rules/).
45
+
46
+
To create a firewall using the NodeBalancer application, in the *NodeBalancer Create* form click the **Create Firewall**. This displays the *Create Firewall* drawer. Configure the required field.
47
+
48
+
|**Configuration**|**Description**|
49
+
| --------------- | --------------- |
50
+
|**Label** (Required)| The label is used as an identifier for this Cloud Firewall. |
51
+
|**Additional Linodes** (Optional)| The Linode(s) on which to apply this Firewall. A list of all Linodes on your account are visible. You can leave this blank if you do not yet wish to apply the Firewall to a Linode. |
52
+
|**Additional NodeBalancers** (Optional) | The NodeBalancers on which to apply this Firewall. A list of all created NodeBalancers on your account are visible. You can leave this blank if you do not want to apply this Cloud Firewall to other NodeBalancers.|
53
+
54
+
Click on the **Create Firewall** button to finish creating the Cloud Firewall and to returned to the the *Nodebalancers Create* form.
55
+
56
+
{{< note >}}
57
+
By default, a new Cloud Firewall accepts all inbound and outbound connections. Only inbound firewall rules apply to NodeBalancers. Custom rules can be added in the Firewall application as needed. See [Add New Cloud Firewall Rules](/docs/products/networking/cloud-firewall/guides/manage-firewall-rules/).
58
+
{{< /note >}}
59
+
60
+
### Cloud Firewall Inbound Rules for NodeBalancer
61
+
- Inbound rules limit incoming network connections to the NodeBalancer based on the port(s) and sources you configure.
62
+
- The NodeBalancer accepts traffic and routes traffic on an internal network to backend targets. For this reason, only inbound firewall rules apply to NodeBalancer.
63
+
- Inbound firewall rules such as IPv4 and IPv6 access control lists (ACLs) can be configured to *Accept* or *Drop* ingress traffic to the NodeBalancer.
64
+
- NodeBalancers can accept TCP connections on all ports. When you add an inbound rule for a NodeBalancer in Cloud Firewall, select TCP as the transport layer protocol. UDP, ICMP, and IPENCAP are not currently supported on NodeBalancers.
65
+
- The firewall is infront of the NodeBalancer and the assigned backend nodes. When both the NodeBalancer and its backend nodes have firewalls, the NodeBalancers inbound firewall rules are applied to incoming requests first, before the requests reach the backend nodes.
66
+
- A backend node server (Linode) can have multiple IP addresses. The NodeBalancer firewall only controls inbound traffic to the backend nodes IPs that are assigned to the NodeBalancer. A service (Linode) can be accessed from any interface (not just the NodeBalancer). To filter traffic from other interfaces, backend Linodes require their own firewalls.
67
+
68
+

69
+
35
70
## Add and Configure Ports
36
71
37
-
To start load balancing traffic, you need to define which ports the NodeBalancer should listen to and how the incoming traffic should be routed to the backend nodes. These ports can be configured within the **NodeBalancer Settings** area. By default, a single port configuration is visible in this area. Additional ports can be added by clicking the **Add another Configuration** button. See [Configuration Options](/docs/products/networking/nodebalancers/guides/configure/) for more details regarding each of these settings.
72
+
To start load balancing traffic, you need to define which ports the NodeBalancer should listen to and how the incoming traffic should be routed to the backend nodes. These ports can be configured within the **NodeBalancer Settings** area. By default, a single port configuration is visible in this area. Additional ports can be added by clicking the **Add Another Configuration** button. See [Configuration Options](/docs/products/networking/nodebalancers/guides/configure/) for more details regarding each of these settings.
38
73
39
74
-**Port:** Enter the *inbound* port the NodeBalancer should listen to. This can be any port from 1 through 65534 and should align with the port the client connects to. See [Configuration Options > Port](/docs/products/networking/nodebalancers/guides/configure/#port).
40
75
-**Protocol:** Select *TCP*, *HTTP*, or *HTTPS*. For many applications, using *TCP* offers the most flexibility and allows for TLS pass through. Using *HTTP* and *HTTPS* offers some additional NodeBalancer options and allows for TLS termination. See [Configuration Options > Protocol](/docs/products/networking/nodebalancers/guides/configure/#protocol).
Copy file name to clipboardExpand all lines: docs/products/networking/nodebalancers/guides/load-balancing/index.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,4 +40,5 @@ The optimal solution for a highly available site or application is to have multi
40
40
41
41
-[Health checks](/docs/products/networking/nodebalancers/guides/configure/#health-checks) are performed to make sure that requests are only routed to healthy Linodes.
42
42
- Backend Linodes can be added or removed seamlessly without end users noticing any downtime.
43
-
- Client requests can be routed to the same backend Linode through [sticky sessions](/docs/products/networking/nodebalancers/guides/configure/#session-stickiness).
43
+
- Client requests can be routed to the same backend Linode through [sticky sessions](/docs/products/networking/nodebalancers/guides/configure/#session-stickiness).
44
+
-[Cloud Firewall](/docs/products/networking/cloud-firewall/) provides enhanced security by allowing you to control who can access your NodeBalancer. The optional Cloud Firewall sits between your NodeBalancer and the internet to filter out unwanted network traffic before it reaches your NodeBalancer. When used in conjunction with NodeBalancers, a Cloud Firewall’s inbound rules only apply to the NodeBalancer’s public IP, not the IPs of the backend nodes. This means you may also want to add individual backend nodes to a Cloud Firewall to protect any additional exposed IP addresses.
0 commit comments