amazon-elb

Cloudfront, ELB and SSL

十年热恋 提交于 2019-12-04 07:27:59
If i use Cloudfront to sit in front of a webserver, which itself is behind an ELB, would the following apply? I use Route53 to create a domain name record for the CF domain and apply an SSL certificate to that domain to secure the distribution If CF can not serve the content from the cache then the SSL connection is forward to the the ELB (which fronts the webserver as an origin server) Therefore i also need to use the same domain name (FQDN) on the ELB (via Route53 CNAME) and apply the same cert there too? When CF forwards the request through the ELB the SSL is terminated Is that right ? Will

Dynamic ports and AWS Applocation Load balancer and ECS

被刻印的时光 ゝ 提交于 2019-12-04 06:58:29
问题 Docker containers behind ELB get dynamic ports which are auto registered with ELB so that they can get traffic redirected to them. In order to make your web servers accessible to ELB you have to open all these ports 1024 - 65535 originating from within your security group. Is there a way to not to have to open up a security group to a range of port but only to the pots that ELB is using? 回答1: Security groups are never modified by AWS as this might cause conflicts and security issues. The only

Cant connect to internet facing ELB from instance in VPC

▼魔方 西西 提交于 2019-12-04 04:37:10
问题 I have a V2 ELB that is internet facing. It routes requests to instances in VPC just fine when I connect to it from my laptop. However when I try to connect to it from another instance inside the same VPC the Security Group firewall rules block the connection. The only way I can get the instances in VPC to connec to the ELB is by opening the https port (443) to the world. What am I doing wrong? The ELB (https://elb.domain.com) has the following attrs: Internet facing, V2 (not classic ELB) VPC

AWS autoscale ELB status checks grace period

旧城冷巷雨未停 提交于 2019-12-04 03:32:58
I'm running servers in a AWS auto scale group. The running servers are behind a load balancer. I'm using the ELB to mange the auto scaling groups healthchecks. When servers are been started and join the auto scale group they are currently immediately join to the load balancer. How much time (i.e. the healthcheck grace period) do I need to wait until I let them join to the load balancer? Should it be only after the servers are in a state of running? Should it be only after the servers passed the system and the instance status checks? There are two types of Health Check available for Auto

Amazon Elastic Load Balancer is not closing the connection to the server

北战南征 提交于 2019-12-04 03:12:00
I have an EC2 instance with Apache as a reverse proxy and ffserver as a streaming server. There is an ELB (Classic) in front of the EC2 instance which works as an SSL termination point. Apache configuration is rather simple: <Location "/mp3/"> ProxyPass http://127.0.0.1:8081/ DisableReuse=On KeepAlive=Off ProxyPassReverse http://127.0.0.1:8081/ SetEnv force-proxy-request-1.0.1 SetEnv proxy-nokeepalive 1 </Location> ffserver is used to stream live audio over the Internet. In ffserver 's settings there is a MaxBandwidth option (default 1000 ). This setting become a problem when the connections

WebSockets and Load Balancing, a bottleneck?

那年仲夏 提交于 2019-12-04 01:59:48
When having a bunch of systems that act as WebSocket drones and a Load Balancer in front of those drones. When a WebSocket request comes into the LB it chooses a WebSocket drone, and the WebSocket is established. (I use AWS ELB tcp SSL-terminated at ELB) Question: Now does the created WebSocket go through the LB, or does the LB forward the WebSocket request to a WebSocket drone and thus there is a direct link between client and a WebSocket drone? If the WebSocket connection goes through the LB, this would make the LB a huge bottleneck. Removing the LB and handing clients a direct IP of a

Varnish + nginx + ELB 499 responses

我怕爱的太早我们不能终老 提交于 2019-12-03 23:03:40
问题 I am having varnish 4 server working with nginx as reverse proxy connected to ELB. Every 2 days or so my server is stop responding and I see 499 responses in nginx access.log restarting nginx is solving the problem. Why am I started to get these 499 responses? Why restarting nginx solving the issue? 回答1: I solved my issue after understanding two facts: 1) ELB instance has dynamic DNS name 2) nginx resolve DNS names only on reload/restart The problem was that the ELB changed its IP address and

Load blancing MQTT broker

☆樱花仙子☆ 提交于 2019-12-03 13:38:33
问题 Is it possible to load balance MQTT broker? Can I use ELB to load balance MQTT? Any pointers in this direction would be helpful. I hit upon http://www.slideshare.net/kellogh/mqtt-kafka-33100776 but it did not help much. 回答1: Use HAProxy . A free, fast and reliable solution offering high availability, load balancing and proxying for TCP and HTTP based applications. It’s suited for very high traffic web sites. 回答2: Load balancing MQTT brokers is not supported out-of-the-box by most MQTT brokers

AWS Application Load Balancer transforms all headers to lower case

本小妞迷上赌 提交于 2019-12-03 12:09:25
I've a REST API application running in two EC2 instance and was using AWS Classic Load Balancer for a long time. The clients of REST API rely on the response headers (e.g. such as Location ). I know that HTTP headers are case-insensitive by definition, however (unfortunately) some clients are ignoring this and checking the headers in a case-sensitive way (e.g. they expect Location to start with upper case). Recently I've changed to AWS Application Load Balancer and now I see that it transforms all response headers to lower case, as a result clients are failing to handle the response properly.

How to configure AWS ELB to block certain IP addresses? (known spammers) [closed]

故事扮演 提交于 2019-12-03 11:35:50
Closed. This question is off-topic. It is not currently accepting answers. Learn more . Want to improve this question? Update the question so it's on-topic for Stack Overflow. I am looking for a way to drop connections from known spam ip addresses on an Amazon's Elastic Load Balancer (ELB)? I am currently doing this at the web server level (multiple instances, running behind the ELB), but wondering if there is a way to do it at the ELB. This way, I can avoid configuring each web server instance for this. I typically pull the Drop List from Spamhause.org every day and update my web server