Adding an HTTP Listener
Scenarios
You can add an HTTP listener if content identification is required. HTTP is a great fit for workloads such as web applications and mobile mini-games.
Constraints
If the listener protocol is HTTP, the backend protocol is HTTP by default and cannot be changed.
Procedure
- Go to the load balancer list page.
- On the displayed page, locate the load balancer and click its name.
- Under Listeners, click Add Listener. Configure the parameters based on Table 1.
Table 1 Parameters for configuring an HTTP listener Parameter
Description
Frontend Protocol
Specifies the protocol that will be used by the load balancer to receive requests from clients.
Select HTTP.
Listening Port
Specifies the port that will be used by the load balancer to receive requests from clients.
The port number ranges from 1 to 65535.
Redirect to another listener
Specifies the HTTPS listener to which HTTP requests are redirected to encrypt the communication and improve service security.
For example, if you configure an HTTP redirection, HTTP requests to access a web page will be redirected to the HTTPS listener you select and handled by the backend servers associated with the HTTPS listener. As a result, the clients access the web page over HTTPS. Note that the configurations for the HTTP listener will not be applied. Requests will be forwarded to backend servers by the HTTPS listener.
Transfer Client IP Address
Transfer Client IP Address is enabled by default for HTTP listeners.
When you use an HTTP listener to forward requests, you can use the X-Forwarded-For header to transfer client IP addresses. The first IP address recorded in the X-Forwarded-For header is the client IP address.
For details, see Transfer Client IP Address.
Access Control
Specifies how access to the listener is controlled. For details, see What Is Access Control?
All IP addresses is selected for access control by default.
You can select Whitelist or Blacklist and choose an IP address group.- Whitelist: Only IP addresses in the whitelist can access the listener. Requests from the IP addresses or CIDR blocks specified in the IP address group will be forwarded by the listener.
Access control policies only take effect for new connections, but not for existing ones. If a whitelist is configured for a listener but IP addresses that are not in the whitelist can access the backend server associated with the listener, it may be caused by a persistent connection between the client and the backend server. To deny IP addresses that are not in the whitelist from accessing the listener, the persistent connection between the client and the backend server needs to be disconnected.
- Blacklist: IP addresses in the blacklist are not allowed to access the listener. Requests from the IP addresses or CIDR blocks specified in the IP address group will not be forwarded by the listener.
More (Optional)
Idle Timeout (s)
Specifies the length of time for a connection to keep alive, in seconds. If no request is received within this period, the load balancer closes the connection and establishes a new one with the client when the next request arrives.
The idle timeout duration ranges from 0 to 4000.
Request Timeout (s)
Specifies the length of time that a load balancer is willing to wait for a client request to complete. The load balancer terminates the connection if a request takes too long to complete.
The request timeout duration ranges from 1 to 300.
Response Timeout (s)
Specifies the length of time (in seconds) after which the load balancer sends a 504 Gateway Timeout error to the client if the load balancer receives no response from the backend server after routing a request to the backend server and receives no response after attempting to route the same request to other backend servers.
The response timeout duration ranges from 1 to 300.
NOTE:If you have enabled sticky sessions and the backend server does not respond within the response timeout duration, the load balancer returns 504 Gateway Timeout to the clients.
Tag
Adds tags to the listener. Each tag is a key-value pair, and the tag key is unique.
Description
Provides supplementary information about the listener.
You can enter a maximum of 255 characters.
- Whitelist: Only IP addresses in the whitelist can access the listener. Requests from the IP addresses or CIDR blocks specified in the IP address group will be forwarded by the listener.
- Click Next: Configure Request Routing Policy.
- You are advised to select an existing backend server group.
- You can also select Create new to create a backend server group.
- Configure the backend server group based on Table 2.
- Click Next: Add Backend Server. Add backend servers and configure a health check for the backend server group.
For details about how to add backend servers, see Backend Server Overview. For the parameters required for configuring a health check, see Table 3.
- Click Next: Confirm.
- Confirm the configurations and click Submit.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot