이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 5. Installing the Load Balancer
The following example provides general guidance for configuring an HAProxy load balancer. However, you can install any suitable load balancing software solution that supports TCP forwarding and sticky sessions.
On a Red Hat Enterprise Linux 7 host, install HAProxy:
# yum install haproxy
Install the following package that includes the
semanage
tool:# yum install policycoreutils-python
Configure SELinux to allow HAProxy to bind any port:
# semanage boolean --modify --on haproxy_connect_any
Configure the load balancer to balance the network load for the ports as described in Table 5.1, “Ports Configuration for the Load Balancer”. For example, to configure ports for HAProxy, edit the
/etc/haproxy/haproxy.cfg
file to correspond with the table.You must configure sticky session on TCP port 443 to request yum metadata for RPM repositories from different Capsule Servers that you configure for load balancing.
Table 5.1. Ports Configuration for the Load Balancer Service Port Mode Balance Mode Destination HTTP
80
TCP
roundrobin
port 80 on all Capsule Servers
HTTPS
443
TCP
source
port 443 on all Capsule Servers
RHSM
8443
TCP
roundrobin
port 8443 on all Capsule Servers
AMQP
5647
TCP
roundrobin
port 5647 on all Capsule Servers
Puppet (Optional)
8140
TCP
roundrobin
port 8140 on all Capsule Servers
PuppetCA (Optional)
8141
TCP
roundrobin
port 8140 only on the system where you configure Capsule Server to sign Puppet certificates
SmartProxy (Optional for OpenScap)
9090
TCP
roundrobin
port 9090 on all Capsule Servers
Docker (Optional)
5000
TCP
roundrobin
port 5000 on all Capsule Servers
- Configure the load balancer to disable SSL offloading and allow client-side SSL certificates to pass through to back end servers. This is required because communication from clients to Capsule Servers depends on client-side SSL certificates.
Start and enable the HAProxy service:
# systemctl start haproxy # systemctl enable haproxy