Provider support for load balancers tables
The following tables summarize the load balancer functionality in each provider.
Please refer to cloud provider documentation or network manager documentation as the definitive guide to the load balancer feature.
Amazon
Abiquo supports AWS Classic load balancers and Application load balancers.
AWS Element | Notes |
---|---|
AWS documentation | http://docs.aws.amazon.com/ElasticLoadBalancing/latest/DeveloperGuide/SvcIntro.html |
Healthy threshold | AWS will assign a previously unhealthy machine a healthy status after a number of successful health checks. |
Load balancer Name |
|
Algorithm |
|
Subnets |
|
High availability | For high availability, create private networks (subnets) in different availability zones in your virtual datacenter |
Routing rules |
|
Routing rule protocol in | AWS accepts HTTP, HTTPS, TCP |
Routing rule port in | AWS accepts 80, 443 and 1024-65535 inclusive |
SSL certificate | Can be a new certificate or an existing one registered in AWS with an ARN.
|
Health check |
|
Firewalls | If a firewall does not display, it may not have been properly synchronized. In this case, you will need to click Cancel, synchronize firewalls and start again creating a new load balancer |
Azure
Abiquo supports Standard SKU load balancers and Basic SKU load balancers.
Azure Element | Notes | |
---|---|---|
Azure documentation | ||
Load balancer Name | The load balancer name can't have white spaces | |
Algorithm |
| |
Addresses and networks |
| |
Routing rules |
| |
Routing rule protocol in | TCP and UDP | |
Routing rule port in | IN and OUT port must use the same protocol | |
SSL certificate | Not yet supported | |
Health check |
| |
Firewalls |
| |
Nodes |
|
VMware NSX load balancers table
This document describes load balancers in NSX-V.
NSX-V Element | Notes |
---|---|
NSX-V documentation | https://www.vmware.com/support/pubs/nsx_pubs.html |
Load balance multiple protocols and ports | Use multiple load balancers to the same IP address each with an incoming connection to a different port |
Algorithms |
|
Addresses | In NSX-V a load balancer must have at least one private address |
Routing rule protocols in | NSX-V accepts HTTP, HTTPS, TCP and UDP |
Changes to routing rules | You can change NSX-V routing rules after they have been created |
Health check | The health check is not required |
Health check protocols | NSX-V supports: HTTP, HTTPS, TCP, UDP, ICMP |
vCloud Director load balancers table
vCloud Director Element | Notes |
---|---|
vCloud Director documentation | VMware vCloud Director documentation center |
Load balance multiple protocols and ports | Use multiple load balancers to the same IP address each with an incoming connection to a different port |
Algorithms |
|
Addresses | In vCloud Director a load balancer must have a "public address", which is an address on an external network (connected to the Edge, meaning external to the OrgVDC or external routed networks). The platform does not support the use of private subnets for load balancers in vCloud because vCloud cannot use isolated external networks or private networks when creating load balancers. To load balance multiple protocols and ports, you can use multiple load balancers to the same IP address but each with a different port. |
Routing rule protocols in | vCloud Director accepts HTTP, HTTPS, TCP |
Changes to routing rules | You can change vCloud Director routing rules after they have been created |
Health check |
|
Health check protocols | vCloud Director supports: HTTP, SSL, TCP. For HTTP routing rules, vCloud supports HTTP or TCP health checks. For HTTPS rules, it supports SSL or TCP. For TCP rules, it only supports TCP. |
Nodes | The platform will add the nodes to the load balancer pool on the Edge in vCloud when you deploy them. You cannot register a VM to a load balancer if it is not using an IP in an external OrgVDC or routed network. |
vCloud vApps | The platform does not support NSX-Edge Compact or fenced vApps. |
Copyright © 2006-2022, Abiquo Holdings SL. All rights reserved