Create a Linode account to try this guide with a $ credit.
This credit will be applied to any valid services used during your first  days.

This guide walks you through creating a NodeBalancer through Cloud Manager.

  1. Open the Create NodeBalancer Form in Cloud Manager
  2. Set the Label
  3. Select a Region
  4. Assign a Cloud Firewall
  5. Add and Configure Ports
  6. Set Up Health Checks for Each Port
  7. Add Back-end Nodes to Each Port
  8. Deploy the NodeBalancer

Open the Create NodeBalancer Form in Cloud Manager

Log in to Cloud Manager and select NodeBalancers from the left navigation menu. Click the Create NodeBalancer button. This opens the NodeBalancer Create form.

Set the Label

Within the Label field, enter the label you wish to use to identify it from other NodeBalancers on your account. A good label should provide some indication as to what the NodeBalancer will be used for. The label must be alphanumeric, between 3 and 32 characters, and unique from other NodeBalancer labels on your account.

Select a Region

Select the region where the NodeBalancer will reside. Regions correspond with individual data centers, each located in a different geographical area. Select the region where you’ve deployed the Compute Instances you intend on using with this NodeBalancer. If you haven’t yet deployed Compute Instances or chosen a region, select the region closest to you and/or your customers. This helps reduce latency and can make a significant impact in connection speeds and quality.

Assign a Cloud Firewall (Optional)

A NodeBalancer can only be attached to one active (enabled) Cloud Firewall at a time. You can attach the same Cloud Firewall to multiple NodeBalancers or other devices.

Select the Cloud Firewall from the Assign Firewall pull down to use with the NodeBalancer.

If the firewall doesn’t exist yet, you can create the firewall using either the Firewall application, or the NodeBalancer application. Rules for the firewall, can only be added in the Firewall application.

To create a firewall and add rules using the Firewall application, see Create a Cloud Firewall and Add Firewall Rules .

To create a firewall using the NodeBalancer application, in the NodeBalancer Create form click the Create Firewall. This displays the Create Firewall drawer. Configure the required field.

ConfigurationDescription
Label (Required)The label is used as an identifier for this Cloud Firewall.
Additional Linodes (Optional)The Linode(s) on which to apply this Firewall. A list of all Linodes on your account are visible. You can leave this blank if you do not yet wish to apply the Firewall to a Linode.
Additional NodeBalancers (Optional)The NodeBalancers on which to apply this Firewall. A list of all created NodeBalancers on your account are visible. You can leave this blank if you do not want to apply this Cloud Firewall to other NodeBalancers.

Click on the Create Firewall button to finish creating the Cloud Firewall and to returned to the NodeBalancers Create form.

Note
By default, a new Cloud Firewall accepts all inbound and outbound connections. Only inbound firewall rules apply to NodeBalancers. Custom rules can be added in the Firewall application as needed. See Add New Cloud Firewall Rules .

Cloud Firewall Inbound Rules for NodeBalancer

  • Inbound rules limit incoming network connections to the NodeBalancer based on the port(s) and sources you configure.
  • The NodeBalancer accepts traffic and routes traffic on an internal network to back end targets. For this reason, only inbound firewall rules apply to NodeBalancer.
  • Inbound firewall rules such as IPv4 and IPv6 access control lists (ACLs) can be configured to Accept or Drop ingress traffic to the NodeBalancer.
  • NodeBalancers can accept TCP connections on all ports. When you add an inbound rule for a NodeBalancer in Cloud Firewall, select TCP as the transport layer protocol. UDP, ICMP, and IPENCAP are not currently supported on NodeBalancers.
  • The firewall is in front of the NodeBalancer and the assigned back-end nodes. When both the NodeBalancer and its back-end nodes have firewalls, the NodeBalancers inbound firewall rules are applied to incoming requests first, before the requests reach the back-end nodes.
  • A back-end node server (Linode) can have multiple IP addresses. The NodeBalancer firewall only controls inbound traffic to the back-end nodes IPs that are assigned to the NodeBalancer. A service (Linode) can be accessed from any interface (not just the NodeBalancer). To filter traffic from other interfaces, back-end Linodes require their own firewalls.

Add and Configure Ports

To start load balancing traffic, you need to define which ports the NodeBalancer should listen to and how the incoming traffic should be routed to the back-end nodes. These ports can be configured within the NodeBalancer Settings area. By default, a single port configuration is visible in this area. Additional ports can be added by clicking the Add Another Configuration button. See Configuration Options for more details regarding each of these settings.

  • Port: Enter the inbound port the NodeBalancer should listen to. This can be any port from 1 through 65534 and should align with the port the client connects to. See Configuration Options > Port .
  • Protocol: Select TCP, HTTP, or HTTPS. For many applications, using TCP offers the most flexibility and allows for TLS pass through. Using HTTP and HTTPS offers some additional NodeBalancer options and allows for TLS termination. See Configuration Options > Protocol .
  • Proxy Protocol: Only visible when the TCP protocol is selected. Used for sending the client IP address to the back-end nodes. See Configuration Options > Proxy Protocol .
  • Algorithm: Controls how new connections are allocated across back-end nodes. See Configuration Options > Algorithm .
  • Session Stickiness: Controls how subsequent requests from the same client are routed when selecting a back-end node. See Configuration Options > Session Stickiness .
Note
For most web applications, it’s common to configure two ports: port 80 and port 443.

Set Up Health Checks for Each Port

Each port can optionally be configured with health checks. These health checks either proactively query the back-end nodes (active) or monitor the existing traffic to back-end nodes (passive). If a health check determines that the back ends aren’t responsive or are encountering another issue, they can be marked as down and taken out of rotation.

Add Back-end Nodes to Each Port

Load balancers work by distributing traffic to a pool of servers. For NodeBalancers, these servers are Linode Compute Instances and they are configured as back-end nodes. Within the Back-end Nodes area of the creation form, add each Compute Instance you intend on using with this NodeBalancer, making sure to select the correct private IP address for the NodeBalancer and the port that the application is using. For information on configuring back-end nodes, see the Configure Back-end Nodes (Compute Instances) guide.

Deploy the NodeBalancer

Once you’ve adjusted the settings to fit your needs, review the NodeBalancer Summary section and click the Create NodeBalancer button. The NodeBalancer should be provisioned within a few minutes.

This page was originally published on


Your Feedback Is Important

Let us know if this guide was helpful to you.