To understand load balancing, you must first understand forward proxy and reverse proxy. Note:
What is Load Balancing The more visits a server receives per unit time, the greater the pressure on the server. When the pressure exceeds its ability to bear, the server will crash. In order to avoid server crashes and provide users with a better experience, we share server pressure through load balancing. We can build many servers to form a server cluster. When a user visits a website, he first accesses an intermediate server, and then lets this intermediate server select a server with less pressure in the server cluster, and then directs the access request to that server. In this way, every time a user visits, the pressure on each server in the server cluster will be balanced, sharing the server pressure and avoiding server crashes. Load balancing is achieved using the principle of reverse proxy. Several common methods of load balancing 1. Polling (default) Each request is assigned to a different backend server one by one in chronological order. If the backend server is down, it can be automatically removed. upstream backserver { server 192.168.0.14; server 192.168.0.15; } 2. Weight Specifies the polling probability. The weight is proportional to the access ratio and is used when the backend server performance is uneven. upstream backserver { server 192.168.0.14 weight=3; server 192.168.0.15 weight=7; } The higher the weight, the greater the probability of being visited. In the above example, they are 30% and 70% respectively. 3. There is a problem with the above method. In the load balancing system, if a user logs in on a server, when the user makes a second request, because we are a load balancing system, each request will be relocated to one of the servers in the cluster. If a user who has logged in to a server is relocated to another server, his login information will be lost, which is obviously inappropriate. We can use the ip_hash instruction to solve this problem. If the client has already visited a server, when the user visits it again, the request will be automatically located to the server through the hash algorithm. Each request is assigned according to the hash result of the access IP, so that each visitor accesses a fixed backend server, which can solve the session problem. upstream backserver { ip_hash; server 192.168.0.14:88; server 192.168.0.15:80; } 4. fair (third party) Requests are distributed based on the response time of the backend server, with requests with shorter response times given priority. upstream backserver { server server1; server server2; fair; } 5. url_hash (third party) Requests are distributed according to the hash result of the accessed URL, so that each URL is directed to the same backend server. This is more effective when the backend server is cached. upstream backserver { server squid1:3128; server squid2:3128; hash $request_uri; hash_method crc32; }123456 The status of each device is set to:
Configuration example: #user nobody; worker_processes 4; events { # Maximum number of concurrent worker_connections 1024; } http{ # List of servers to be selected upstream myproject{ # The ip_hash directive directs the same user to the same server. ip_hash; server 125.219.42.4 fail_timeout=60s; server 172.31.2.183; } server{ # Listening port listen 80; # Root directory location / { # Select which server list proxy_pass http://myproject; } } } Summarize The above is the full content of this article. I hope that the content of this article will have certain reference learning value for your study or work. Thank you for your support of 123WORDPRESS.COM. You may also be interested in:
|
<<: Detailed explanation of Angular routing sub-routes
>>: Detailed explanation of the implementation of shared modules in Angular projects
1. Installation 1. Download Go to the MySQL offic...
Here, I have mainly sorted out some commonly used...
Preface I recently used :first-child in a project...
There is often a scenario where the image needs t...
Anyone who has used the Linux system should know ...
Use the following command to create a container a...
Docker official documentation: https://docs.docke...
What is ELK? ELK is a complete set of log collect...
Effect The pictures in the code can be changed by...
Preface Nowadays, in projects, the Axios library ...
Written in front: Sometimes you may need to view ...
HTML structure <body> <div class="w...
Table of contents 1. exists 1.1 Description 1.2 E...
Table of contents 1. Background 2. Local custom i...
1. Two types of DMA mapping 1.1. Consistent DMA m...