copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2019-10-01 |
kubernetes, iks, lb1.0, nlb |
containers |
{:new_window: target="_blank"} {:shortdesc: .shortdesc} {:screen: .screen} {:pre: .pre} {:table: .aria-labeledby="caption"} {:codeblock: .codeblock} {:tip: .tip} {:note: .note} {:important: .important} {:deprecated: .deprecated} {:download: .download} {:preview: .preview}
{: #loadbalancer}
Version 1.0 NLBs can be created in classic clusters only, and cannot be created in VPC on Classic clusters. To load balance in VPC clusters, see Exposing apps with load balancers for VPC. {: note}
Expose a port and use a portable IP address for a Layer 4 network load balancer (NLB) to expose a containerized app. For information about version 1.0 NLBs, see Components and architecture of an NLB 1.0. {:shortdesc}
To quickly get started, you can run the following command to create a load balancer 1.0:
kubectl expose deploy my-app --port=80 --target-port=8080 --type=LoadBalancer --name my-lb-svc
{: pre}
{: #multi_zone_config}
Before you begin:
- To create public network load balancers (NLBs) in multiple zones, at least one public VLAN must have portable subnets available in each zone. To create private NLBs in multiple zones, at least one private VLAN must have portable subnets available in each zone. You can add subnets by following the steps in Configuring subnets for clusters.
- Enable a Virtual Router Function (VRF) for your IBM Cloud infrastructure account. To enable VRF, contact your IBM Cloud infrastructure account representative. To check whether a VRF is already enabled, use the
ibmcloud account show
command. If you cannot or do not want to enable VRF, enable VLAN spanning. When a VRF or VLAN spanning is enabled, the NLB 2.0 can route packets to various subnets in the account. - Ensure you have the Writer or Manager {{site.data.keyword.cloud_notm}} IAM service role for the
default
namespace.* Ensure that you have the Writer or Manager {{site.data.keyword.cloud_notm}} IAM service role for thedefault
namespace. - Ensure you have the required number of worker nodes:
- Classic clusters: If you restrict network traffic to edge worker nodes, ensure that at least two edge worker nodes are enabled in each zone so that NLBs deploy uniformly.
- Gateway-enabled classic clusters: Ensure that at least two gateway worker nodes in the
gateway
worker pool are enabled in each zone so that NLBs deploy uniformly.
To set up an NLB 1.0 service in a multizone cluster:
-
Deploy your app to the cluster. Ensure that you add a label in the metadata section of your deployment configuration file. This custom label identifies all pods where your app runs to include them in the load balancing.
-
Create a load balancer service for the app that you want to expose to the public internet or a private network.
-
Create a service configuration file that is named, for example,
myloadbalancer.yaml
. -
Define a load balancer service for the app that you want to expose. You can specify a zone, a VLAN, and an IP address.
apiVersion: v1 kind: Service metadata: name: myloadbalancer annotations: service.kubernetes.io/ibm-load-balancer-cloud-provider-ip-type: <public_or_private> service.kubernetes.io/ibm-load-balancer-cloud-provider-zone: "<zone>" service.kubernetes.io/ibm-load-balancer-cloud-provider-vlan: "<vlan_id>" spec: type: LoadBalancer selector: <selector_key>: <selector_value> ports: - protocol: TCP port: 8080 loadBalancerIP: <IP_address>
{: codeblock}
Understanding the YAML file components Understanding the YAML file components service.kubernetes.io/ibm-load-balancer-cloud-provider-ip-type:
Annotation to specify a private
orpublic
load balancer.Create the service in your cluster.
kubectl apply -f myloadbalancer.yaml
{: pre}
Verify that the NLB service was created successfully. It might take a few minutes for the service to be created and for the app to be available.
kubectl describe service myloadbalancer
{: pre}
Example CLI output:
Name: myloadbalancer Namespace: default Labels: <none> Selector: app=liberty Type: LoadBalancer Zone: dal10 IP: 172.21.xxx.xxx LoadBalancer Ingress: 169.xx.xxx.xxx Port: <unset> 8080/TCP NodePort: <unset> 32040/TCP Endpoints: 172.30.xxx.xxx:8080 Session Affinity: None Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- ---- ------ ------- 10s 10s 1 {service-controller } Normal CreatingLoadBalancer Creating load balancer 10s 10s 1 {service-controller } Normal CreatedLoadBalancer Created load balancer
{: screen}
The LoadBalancer Ingress IP address is the portable IP address that was assigned to your NLB service.
If you created a public NLB, access your app from the internet.
-
Open your preferred web browser.
-
Enter the portable public IP address of the NLB and port.
http://169.xx.xxx.xxx:8080
{: codeblock}
Repeat the steps 2 - 4 to add a version 1.0 NLB in each zone.
If you choose to enable source IP preservation for an NLB 1.0, ensure that app pods are scheduled onto the edge worker nodes by adding edge node affinity to app pods. App pods must be scheduled onto edge nodes to receive incoming requests.
Optional: A load balancer service also makes your app available over the service's NodePorts. NodePorts are accessible on every public and private IP address for every node within the cluster. To block traffic to NodePorts while you are using an NLB service, see Controlling inbound traffic to network load balancer (NLB) or NodePort services.
Next, you can register an NLB subdomain.
{: #lb_config}
Before you begin:
- You must have an available portable public or private IP address to assign to the network load balancer (NLB) service. For more information, see Configuring subnets for clusters.
- Ensure you have the Writer or Manager {{site.data.keyword.cloud_notm}} IAM service role for the
default
namespace.
To create an NLB 1.0 service in a single-zone cluster:
-
Deploy your app to the cluster. Ensure that you add a label to your deployment in the metadata section of your configuration file. This label is needed to identify all pods where your app runs so that they can be included in the load balancing.
-
Create a load balancer service for the app that you want to expose to the public internet or a private network.
-
Create a service configuration file that is named, for example,
myloadbalancer.yaml
. -
Define a load balancer service for the app that you want to expose.
apiVersion: v1 kind: Service metadata: name: myloadbalancer annotations: service.kubernetes.io/ibm-load-balancer-cloud-provider-ip-type: <public_or_private> service.kubernetes.io/ibm-load-balancer-cloud-provider-vlan: "<vlan_id>" spec: type: LoadBalancer selector: <selector_key>: <selector_value> ports: - protocol: TCP port: 8080 loadBalancerIP: <IP_address> externalTrafficPolicy: Local
{: codeblock}
Understanding the YAML file componentsExample configuration file to create a private NLB 1.0 service that uses a specified IP address on private VLAN
2234945
:apiVersion: v1 kind: Service metadata: name: myloadbalancer annotations: service.kubernetes.io/ibm-load-balancer-cloud-provider-ip-type: private service.kubernetes.io/ibm-load-balancer-cloud-provider-vlan: "2234945" spec: type: LoadBalancer selector: app: nginx ports: - protocol: TCP port: 8080 loadBalancerIP: 172.21.xxx.xxx
{: codeblock}
-
Optional: Make your NLB service available to only a limited range of IP addresses by specifying the IPs in the
spec.loadBalancerSourceRanges
field.loadBalancerSourceRanges
is implemented bykube-proxy
in your cluster via Iptables rules on worker nodes. For more information, see the Kubernetes documentation . -
Create the service in your cluster.
kubectl apply -f myloadbalancer.yaml
{: pre}
-
-
Verify that the NLB service was created successfully. It might take a few minutes for the service to be created and for the app to be available.
kubectl describe service myloadbalancer
{: pre}
Example CLI output:
Name: myloadbalancer Namespace: default Labels: <none> Selector: app=liberty Type: LoadBalancer Location: dal10 IP: 172.21.xxx.xxx LoadBalancer Ingress: 169.xx.xxx.xxx Port: <unset> 8080/TCP NodePort: <unset> 32040/TCP Endpoints: 172.30.xxx.xxx:8080 Session Affinity: None Events: FirstSeen LastSeen Count From SubObjectPath Type Reason Message --------- -------- ----- ---- ------------- ---- ------ ------- 10s 10s 1 {service-controller } Normal CreatingLoadBalancer Creating load balancer 10s 10s 1 {service-controller } Normal CreatedLoadBalancer Created load balancer
{: screen}
The LoadBalancer Ingress IP address is the portable IP address that was assigned to your NLB service.
-
If you created a public NLB, access your app from the internet.
-
Open your preferred web browser.
-
Enter the portable public IP address of the NLB and port.
http://169.xx.xxx.xxx:8080
{: codeblock}
-
-
If you choose to enable source IP preservation for an NLB 1.0, ensure that app pods are scheduled onto the edge worker nodes by adding edge node affinity to app pods. App pods must be scheduled onto edge nodes to receive incoming requests.
-
Optional: A load balancer service also makes your app available over the service's NodePorts. NodePorts are accessible on every public and private IP address for every node within the cluster. To block traffic to NodePorts while you are using an NLB service, see Controlling inbound traffic to network load balancer (NLB) or NodePort services.
Next, you can register an NLB subdomain.
{: #node_affinity_tolerations}
This feature is for version 1.0 network load balancers (NLBs) only. The source IP address of client requests is preserved by default in version 2.0 NLBs. {: note}
When a client request to your app is sent to your cluster, a load balancer service pod receives the request. If no app pod exists on the same worker node as the load balancer service pod, the NLB forwards the request to an app pod on a different worker node. The source IP address of the package is changed to the public IP address of the worker node where the load balancer service pod runs. {: shortdesc}
To preserve the original source IP address of the client request, you can enable source IP for load balancer services. The TCP connection continues all the way to the app pods so that the app can see the actual source IP address of the initiator. Preserving the client’s IP is useful, for example, when app servers have to apply security and access-control policies.
After you enable the source IP, load balancer service pods must forward requests to app pods that are deployed to the same worker node only. Typically, load balancer service pods are also deployed to the worker nodes that the app pods are deployed to. However, some situations exist where the load balancer pods and app pods might not be scheduled onto the same worker node:
- You have edge nodes that are tainted so that only load balancer service pods can deploy to them. App pods are not permitted to deploy to those nodes.
- Your cluster is connected to multiple public or private VLANs, and your app pods might deploy to worker nodes that are connected only to one VLAN. Load balancer service pods might not deploy to those worker nodes because the NLB IP address is connected to a different VLAN than the worker nodes.
To force your app to deploy to specific worker nodes where load balancer service pods can also deploy to, you must add affinity rules and tolerations to your app deployment.
{: #lb_edge_nodes}
When you label worker nodes as edge nodes and also taint the edge nodes, load balancer service pods deploy only to those edge nodes, and app pods cannot deploy to edge nodes. When source IP is enabled for the NLB service, the load balancer pods on the edge nodes cannot forward incoming requests to your app pods on other worker nodes. {:shortdesc}
To force your app pods to deploy to edge nodes, add an edge node affinity rule and toleration to the app deployment.
Example deployment YAML file with edge node affinity and edge node toleration:
apiVersion: apps/v1 kind: Deployment metadata: name: with-node-affinity spec: selector: matchLabels: <label_name>: <label_value> template: spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: dedicated operator: In values: - edge tolerations: - key: dedicated value: edge ...
{: codeblock}
Both the affinity and tolerations sections have
dedicated
as thekey
andedge
as thevalue
.{: #edge_nodes_multiple_vlans}
When your cluster is connected to multiple public or private VLANs, your app pods might deploy to worker nodes that are connected only to one VLAN. If the NLB IP address is connected to a different VLAN than these worker nodes, load balancer service pods won't deploy to those worker nodes. {:shortdesc}
When source IP is enabled, schedule app pods on worker nodes that are the same VLAN as the NLB's IP address by adding an affinity rule to the app deployment.
Before you begin: Log in to your account. If applicable, target the appropriate resource group. Set the context for your cluster.
-
Get the IP address of the NLB service. Look for the IP address in the LoadBalancer Ingress field.
kubectl describe service <loadbalancer_service_name>
{: pre}
-
Retrieve the VLAN ID that your NLB service is connected to.
-
List portable public VLANs for your cluster.
ibmcloud ks cluster get --cluster <cluster_name_or_ID> --show-resources
{: pre}
Example output:
... Subnet VLANs VLAN ID Subnet CIDR Public User-managed 2234947 10.xxx.xx.xxx/29 false false 2234945 169.36.5.xxx/29 true false
{: screen}
-
In the output under Subnet VLANs, look for the subnet CIDR that matches the NLB IP address that you retrieved earlier and note the VLAN ID.
For example, if the NLB service IP address is
169.36.5.xxx
, the matching subnet in the example output of the previous step is169.36.5.xxx/29
. The VLAN ID that the subnet is connected to is2234945
.
-
-
Add an affinity rule to the app deployment for the VLAN ID that you noted in the previous step.
For example, if you have multiple VLANs but want your app pods to deploy to worker nodes on the
2234945
public VLAN only:apiVersion: apps/v1 kind: Deployment metadata: name: with-node-affinity spec: selector: matchLabels: <label_name>: <label_value> template: spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: publicVLAN operator: In values: - "2234945" ...
{: codeblock}
In the example YAML, the affinity section has
publicVLAN
as thekey
and"2234945"
as thevalue
. -
Apply the updated deployment configuration file.
kubectl apply -f with-node-affinity.yaml
{: pre}
-
Verify that the app pods deployed to worker nodes connected to the designated VLAN.
-
List the pods in your cluster. Replace
<selector>
with the label that you used for the app.kubectl get pods -o wide app=<selector>
{: pre}
Example output:
NAME READY STATUS RESTARTS AGE IP NODE cf-py-d7b7d94db-vp8pq 1/1 Running 0 15d 172.30.xxx.xxx 10.176.48.78
{: screen}
-
In the output, identify a pod for your app. Note the NODE ID of the worker node that the pod is on.
In the example output of the previous step, the app pod
cf-py-d7b7d94db-vp8pq
is on worker node10.176.48.78
. -
List the details for the worker node.
kubectl describe node <worker_node_ID>
{: pre}
Example output:
Name: 10.xxx.xx.xxx Role: Labels: arch=amd64 beta.kubernetes.io/arch=amd64 beta.kubernetes.io/os=linux failure-domain.beta.kubernetes.io/region=us-south failure-domain.beta.kubernetes.io/zone=dal10 ibm-cloud.kubernetes.io/encrypted-docker-data=true kubernetes.io/hostname=10.xxx.xx.xxx privateVLAN=2234945 publicVLAN=2234967 ...
{: screen}
-
In the Labels section of the output, verify that the public or private VLAN is the VLAN that you designated in previous steps.
-