Loadbalancer Configuration
Warning
This guide details how to set up the load balancer configuration for Chef Automate and Chef Infra Server.
Listed below are some ways for setting up load balancer.
- Using NGINX
- Using HA Proxy
Load Balancer
Assuming you have DNS configured with domain names:
- Chef Automate: chefautomate.example.com
- Chef Infra Server: chefinfraserver.example.com
Load Balancer setup using NGINX
Install Nginx
For Debian / Ubuntu :
sudo apt-get update
sudo apt-get install nginx
For Centos or Redhat :
sudo yum install epel-release
sudo yum update
sudo yum install nginx
Configure
- Create new file
/etc/nginx/sites-available/chef-automate-lb.conf
upstream chef-automate-servers {
# Add a list of automate machine ip addresses.
server 10.1.0.101:443 max_fails=2 fail_timeout=30s;
server 10.1.0.102:443 max_fails=2 fail_timeout=30s;
server 10.1.0.103:443 max_fails=2 fail_timeout=30s;
}
# The below section is used for https call
server {
listen 443 ssl;
# You need to get your own automate DNS,
# here we have taken example DNS: chefautomate.example.com
server_name chefautomate.example.com;
# Here ssl certificate is added,
# we have created certificate using certBot, below url is an example for ubuntu machine
# reference: https://certbot.eff.org/instructions?ws=nginx&os=ubuntufocal
ssl_certificate /etc/letsencrypt/live/chefautomate.example.com/cert.pem;
ssl_certificate_key /etc/letsencrypt/live/chefautomate.example.com/privkey.pem;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
location / {
proxy_pass https://chef-automate-servers;
proxy_set_header Host $host;
}
}
# The below section is used for http call
server {
listen 80;
server_name chefautomate.example.com;
return 301 https://$server_name$request_uri;
}
- Create new file
/etc/nginx/sites-available/chef-infra-server-lb.conf
upstream chef-infra-servers {
# Add a list of infra server machine api addresses.
server 10.1.0.101:443 max_fails=2 fail_timeout=30s;
server 10.1.0.102:443 max_fails=2 fail_timeout=30s;
server 10.1.0.103:443 max_fails=2 fail_timeout=30s;
}
# The below section is used for https call
server {
listen 443 ssl;
# You need to get your own infra server DNS,
# here we have taken example DNS: chefinfraserver.example.com
server_name chefinfraserver.example.com;
# Here ssl certificate is added,
# we have created certificate using certBot, below url is an example for ubuntu machine
# reference: https://certbot.eff.org/instructions?ws=nginx&os=ubuntufocal
ssl_certificate /etc/letsencrypt/live/chefinfraserver.example.com/cert.pem;
ssl_certificate_key /etc/letsencrypt/live/chefinfraserver.example.com/privkey.pem;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
location / {
proxy_pass https://chef-infra-servers;
proxy_set_header Host $host;
}
}
# The below section is used for http call
server {
listen 80;
server_name chefinfraserver.example.com;
return 301 https://$server_name$request_uri;
}
- Enable Sites for Chef Automate and Chef Infra Server
sudo ln -s /etc/nginx/sites-available/chef-automate-lb.conf /etc/nginx/sites-enabled/
sudo ln -s /etc/nginx/sites-available/chef-infra-server-lb.conf /etc/nginx/sites-enabled/
- Test Nginx Config
sudo nginx -t
- Restart Nginx
sudo systemctl restart nginx
Load Balancer setup using HA Proxy
For Debian / Ubuntu :
sudo apt-get update
sudo apt install haproxy
For Centos or Redhat :
sudo yum install epel-release
sudo yum update
sudo yum install haproxy
Configure
HAProxy needs an ssl-certificate to be one file, in a certain format. To do that, we create a new directory where the SSL certificate for automate and infra server that HAProxy reads will live. Then we output the “live” (latest) certificates from LetsEncrypt and dump that output into the certificate file for HAProxy to use:
For Chef Automate:
sudo mkdir -p /etc/ssl/chefautomate.example.com sudo cat /etc/letsencrypt/live/chefautomate.example.com/fullchain.pem \ /etc/letsencrypt/live/chefautomate.example.com/privkey.pem \ | sudo tee /etc/ssl/chefautomate.example.com/chefautomate.example.com.pem
For Chef Infra Server:
sudo mkdir -p /etc/ssl/chefinfraserver.example.com sudo cat /etc/letsencrypt/live/chefinfraserver.example.com/fullchain.pem \ /etc/letsencrypt/live/chefinfraserver.example.com/privkey.pem \ | sudo tee /etc/ssl/chefinfraserver.example.com/chefinfraserver.example.com.pem
Once HA Proxy is installed, add the following to the configuration file present at
/etc/haproxy/haproxy.cfg
. This will set the load balancer config for chef automate and chef infra server.
# The below section is used for http call
frontend fe_a2ha_http
mode http
bind *:80
redirect scheme https code 301 if !{ ssl_fc }
# The below section is used for https call
frontend fe_a2ha
mode tcp
# You need to get your own automate DNS,
# here we have taken example DNS: chefautomate.example.com and chefinfraserver.example.com
# Here ssl certificate is added,
# we have created certificate using certBot, below url is an example for ubuntu machine
# reference: https://certbot.eff.org/instructions?ws=nginx&os=ubuntufocal
bind *:443 ssl crt /etc/ssl/chefautomate.example.com/chefautomate.example.com.pem crt /etc/ssl/chefinfraserver.example.com/chefinfraserver.example.com.pem
use_backend automate_server if { ssl_fc_sni chefautomate.example.com }
use_backend chef_infra_server if { ssl_fc_sni chefinfraserver.example.com }
backend automate_server
balance roundrobin
# Add a list of automate machine ip addresses.
server automate1 10.1.0.101:443 check ssl verify none
server automate2 10.1.0.102:443 check ssl verify none
server automate3 10.1.0.103:443 check ssl verify none
backend chef_infra_server
balance roundrobin
# Add a list of infra server machine ip addresses.
server infra1 10.1.0.101:443 check ssl verify none
server infra2 10.1.0.102:443 check ssl verify none
server infra3 10.1.0.103:443 check ssl verify none
- Test HA Proxy Config
sudo haproxy -c -f /etc/haproxy/haproxy.cfg
- Restart HA Proxy
sudo systemctl restart haproxy
Was this page helpful?