automation-suite
2022.4
false
UiPath logo, featuring letters U and I in white
Automation Suite Installation Guide
Last updated Nov 21, 2024

Configuring the load balancer

Overview

A load balancer is mandatory for the multi-node HA-ready production setup.

Automation Suite supports two types of configuration for the load balancer, as shown in the following sections.

You can configure the load balancer to use session persistence or sticky sessions, but it is not a requirement.

Note:

Currently, Automation Suite supports only a Layer 4 (network layer) load balancer.

The load balancer does not support TLS encryption and termination. For effective service operation, make sure to configure your load balancer to facilitate traffic pass-through.

If you are using the Azure Internal Load Balancer (LB) for deployments, you can encounter issues with the calls from the backend Virtual Machine (VM) to the LB frontend IP. The issues occur due to source IP and MAC address mismatch of the network packet. This prevents the recipient from working out the correct response path, resulting in the failure of calls from the VM to the LB. For more details, see Azure Load Balancer Components limitations and Backend Traffic Troubleshooting.

Server and node pool configuration

This is the recommended configuration for the load balancer.

Configuring the backend pool

You need to create two backend pools that meet the following requirements:

  • Server Pool

    • Consists of all the server nodes.
    • There must not be any agent nodes in the Server Pool.
  • Node Pool

    • Consists of all the server nodes and agent nodes.

Configuring the health probes

Probe

Protocol

Port

Interval

Re-entry threshold

Associate pool

https-probe

TCP

443

15 sec

2

Node Pool

kubeapi-probe

TCP

6443

15 sec

2

Server Pool

Refer to the following illustration for more details on the configuration



Enabling ports on the load balancer

Ensure you have the following ports enabled on your firewall for the source of load balancer:

Port

Protocol

Purpose

Traffic forwarding

Health probe

443

TCP

For HTTPS (accessing Automation Suite)

Traffic on this port should be forwarded to Node Pool.

https-probe

6443

TCP

For accessing Kube API using HTTPS; required for node joining.

Traffic on this port should be forwarded to Server Pool.

kubeapi-probe

9345

TCP

For accessing Kube API using HTTPS; required for node joining.

Traffic on this port should be forwarded to Server Pool.

kubeapi-probe

Note:

For any ports other than HTTPS, we recommend it is not exposed outside the cluster. Run your nodes behind a firewall / security group.

If you have a firewall setup in the network, make sure that it has these ports open to allow traffic from those ports.

Refer to the following illustration for more details on the configuration.

Alternative configuration

Important:

This configuration does not have resilience to nodes going down during installation.

If the primary server is down or deleted, cluster configuration needs to be updated.

FQDN of the primary server needs to be remapped to a different machine in the cluster that is available.

Configuring the backend pool

Create one backend Pool, as follows:

  • Create a Node Pool

Enabling ports on the load balancer

Ensure that you have the following ports enabled on your firewall for the source of load balancer:

Port

Protocol

Purpose

Traffic forwarding

443

TCP

For HTTPS (accessing Automation Suite).

Traffic on this port should be forwarded to the Node Pool.

Configuring the health probes

Probe

Protocol

Port

Interval

Re-entry threshold

Associate pool

https-probe

TCP

443

15 sec

2

Node Pool

Refer to the following illustration for more details on the configuration.



Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.