(ADC Application Delivery Controller)
Get your test drive here
Here are a few words to help you navigate the user interface and get the most out of your test drive, so fasten your seat belt….
Once you have signed up to your ALB-X test drive you will be presented with your own unique URL to access the ALB-X GUI from you web browser. If possible we would recommend using the Google Chrome browser.
For live deployment you are free to upload your own certificate to confirm authenticity of the management connection.
When prompted enter your unique username and password for this test drive session (you have been sent this in the email).
Because this is a custom test drive we have pre-populated the IP-Services with some services you can try straight away. For the purposes of the test drive we have made real server content available on 2 publicly available web servers:
There are 4 demo services we have set up for you:
The first service is a basic port 80 web server load balancer using our ‘least connections’ load balancing policy to 2 ‘real servers’.
The second service is on port 443. In this case the load balancer is doing the encryption sometimes called SSL ‘offload’.
Please feel free to upload your own SSL certificate and apply it to the service, see instructions later. Once you have clicked past the security exception you will see the same content displayed in your browser.
The first thing we can take a look at that uses flightPATH is HTTP to HTTPS redirection.
This is a feature that is often used to ensure web traffic is served using a secure connection.
If flightPATH sees this ‘condition’ it will act upon the traffic and return a 302 redirect to the browser to tell it to perform another GET request to HTTPS://your.original.request.location which in this case will be the same public IP address of the service but on the 443 channel.
You might like to take a look now at how the flightPATH rule is configured.
This you do by clicking on the Library tab on the left and selecting flightPATH.
Click on the ‘Force HTTPS – when query string is secure’ entry and you can see the
As you will have seen the connections have so far been spread across both real servers – this is why you see images returned from both server 1 and server 2. This is because the default load balancing policy is ‘least connections’, this will try to maintain an even number of connections to all the servers configured for a service.
For HTTP services this can be achieved by applying a special session cookie that the browser will present on all subsequent requests to that service, normally for the period of the ‘session’.
The flightPATH rule looks at the requested path and if it is /601/ it will send the traffic to the service running on port 601. Here are the details of this flightPATH rule.
This flightPATH rule shows how traffic can be sent another service based on the path, this is a powerful tool for traffic manipulation or content steering.
We can see the Configuration of the VIP on port 601:
You can see here all the content is served from Server 1 – you can check your browser developer tools and you will see that a cookie called jnAccel= has been set.
As the real server does not have any content under the /601/ path we needed to remove it from the request or we would get a 404 error (which we can also hide using flightPATH).
Here we again look for 601 in the path as a condition to trigger this rule.
So we create the NewPath by just extracting the data after the leading /601/ path prefix.
The ‘Action’ is to Rewrite Path using the $NewPath1$ and $querystring$ if it were present.
In the other service example using port :602 we show how you can also manipulate the HTML content and not just the HTTP header.
If you enter the public IP address of your test drive ALB-X in your browser and append /?602 you should get the following result returned.
You can see an additional line of text in orange stating that -
This is achieved by means of 2 flightPATH rules.
The following rule applied to port:80 looks for a query string value of 602 and sends all matching requests to the service running on port 602.
Applied to the service running on port :602 is a flightPATH rule that performs a ‘Body Replace Last’ function looking for the closing body tag
and replacing it with
This text has been added by flightPATH
There is no condition or evaluation required in this case so the function will apply to all traffic passing through the service.
Hopefully you can see how else these facilities could be combined to perform some clever HTTP traffic manipulation and these are just the tip of the iceberg of what flightPATH can do.
Please experiment for yourself and we would be glad to hear about your specific requirements.
The next thing we will take a look at is real server health checking. It is vital that the right type of health check is applied to a service to enable reliable detection of the health of the back end server(s) to ensure client traffic is only sent to servers that are operational.
When creating a new service we have to define a default set of parameters. For the Server Monitoring we use the TCP Connection health check. The Server Monitoring option is found under the Basic tab for the service being configured.
Whilst this is a reasonable starting point it is highly recommended that a more reliable health check be configured and applied to a service, and we have made it super easy to create custom HTTP health checks.
In the Test Drive we have added a third Real Server Monitor to show an example of a HTTP response health check.
The 200OK Uses an HTTP GET request to the page location configured for the check and makes sure a 200OK status response is returned.
It doesn’t look for any specific content it just checks that a web server is running on the port and is able to serve the page requested.
We have applied this monitor as you can see above to the service running on port:601.
The NLS Monitor configured in the Test Drive makes use the HTTP Response check.
For this you define the specific page location (this can be the complete URL where host headers are required) and you define content (a text string) that should be present in the returned data from the server / application.
This is a far better test as the page must be present and the specific content needs to be available.
You can see we have applied this monitor to the service running on port:602.
You can modify the text in the Required Content field for this health check and you will see the servers go red to show they have failed the health check. Revert the required content back to the correct value and the servers will come back OK green.
Under the advanced tab you are able to manipulate the frequency and time out etc for the health check operation on that service.
For the test drive we have set the Monitor Interval to 3 seconds with a 2 second time out.
The Monitoring Out Count is set to 3 so it must fail to get 3 consecutive responses before marking the server unreachable.
More and more websites are using HTTPS and by the beginning of 2017 the percentage had swung in favour of HTTPS.
Most enterprise applications require protection through encryption so it is a pretty safe bet that you will need to use certificates on the ALB-X and deploying a load balancer with HTTPS is a quick and easy way to secure access to non encrypted applications.
The service is configured for SSL offload and so the Real Server side is configured for No SSL.
You can upload your own signed certificates to the ALB-X using the SSL Certificates menu in the Library section
As highlighted in the text input fields the certificate needs to be the PKCS#12 format to be imported in to ALB-X.
The name (which must not contain spaces) you give the certificate at import will be what appears in the certificate selection drop downs in the IP service Basic tab.
If the real servers require SSL/TLS re-encryption the most sensible option to select is ‘Any’ from the Real Server SSL Certificate drop down.
With the scarcity of Public IP addresses and the fact that only one VIP can be configured in Azure it is useful to be able to support multiple secure domains / host URLs through one virtual service and this is possible on ALB-X because we support SNI.
On the Real Server side if the services are re-encrypted and hosted on common servers they will require SNI for the correct service identification and negotiation, so SNI should be selected as the option in the Real Server SSL Certificate drop down.
ALB-X supports the deployment of additional features and functionality by purchasing and downloading Apps from our App Store for deployment within the ALB-X containerised environment.
We have set up 2 separate Test Drives in Azure where you can see this functionality in operation, so please check these out if you are interested.
ALB-X supports Pre Authentication in conjunction with a MS AD (Microsoft Active Directory ) / LDAP server.
This functionality is a popular replacement for the discontinued Microsoft TMG product.
The view section of the menu provides you the means to be able see connection status and real server health either in real time (Status) or as a trend over time (History).
This is where you will find configuration options that apply to the system functions such as setting Time & Date, enabling email alerting, Licensing the product, choosing how logging is performed and where logs are sent, rebooting and restarting the appliance configuring SNMP and adding other management users etc.
In the advanced menu you are able to backup and restore configuration and also upload jetPACK template configurations.
Lastly there is a troubleshooting section where we have made it easy to download a bundled support file package, perform network PING and perform various system traces and network packet captures.