Skip to content

Commit b59b6d8

Browse files
committed
add prereqs
1 parent 4e4e239 commit b59b6d8

File tree

1 file changed

+12
-27
lines changed

1 file changed

+12
-27
lines changed

src/content/docs/load-balancing/private-network/warp-to-tunnel.mdx

Lines changed: 12 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sidebar:
99

1010
import { DashButton, Render, Tabs, TabItem, APIRequest, GlossaryTooltip } from "~/components"
1111

12-
You can use Private Network Load Balancing to distribute WARP client traffic to private IP addresses connected via [Cloudflare Tunnel](/cloudflare-one/connections/connect-networks/).
12+
You can use Private Network Load Balancing to distribute WARP client traffic to private hostnames and IPs connected via [Cloudflare Tunnel](/cloudflare-one/connections/connect-networks/).
1313

1414
For example, assume you have an internal application running in two data centers, and you want WARP users to access the application from the data center closest to their geographic location. A typical load balancing configuration is shown in the following diagram:
1515

@@ -21,17 +21,17 @@ graph LR
2121
subgraph D2[Data center 2]
2222
cf2@{ shape: processes, label: "cloudflared" }
2323
subgraph F[Pool 2]
24-
S3["Endpoint <br> 10.0.0.1 (VNET-2)"]
25-
S4["Endpoint <br> 10.0.0.2 (VNET-2)"]
24+
S3["Endpoint <br> server3.internal.local <br> 10.0.0.1 (VNET-2)"]
25+
S4["Endpoint <br> server4.internal.local <br> 10.0.0.2 (VNET-2)"]
2626
end
2727
cf2-->S3
2828
cf2-->S4
2929
end
3030
subgraph D1[Data center 1]
3131
cf1@{ shape: processes, label: "cloudflared" }
3232
subgraph E[Pool 1]
33-
S1["Endpoint <br> 10.0.0.1 (VNET-1)"]
34-
S2["Endpoint <br> 10.0.0.2 (VNET-1)"]
33+
S1["Endpoint <br> server1.internal.local <br> 10.0.0.1 (VNET-1)"]
34+
S2["Endpoint <br> server2.internal.local <br> 10.0.0.2 (VNET-1)"]
3535
end
3636
cf1-->S1
3737
cf1-->S2
@@ -43,30 +43,15 @@ graph LR
4343

4444
The components in the diagram include:
4545
- **cloudflared**: Each data center is connected to Cloudflare with its own Cloudflare Tunnel. `cloudflared` installs on one or [more](/cloudflare-one/connections/connect-networks/configure-tunnels/tunnel-availability/#cloudflared-replicas) host machines in the network.
46-
- **Virtual network (VNET)**: If the networks behind each tunnel have the same internal IP range, you can assign a distinct [virtual network](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) per tunnel so that Load Balancer can deterministically route requests to the correct endpoint.
4746
- **Private load balancer IP**: End users connect to the application using the load balancer's IP address. This can either be a Cloudflare-assigned CGNAT IP (`100.64.0.0/10`) or a custom [RFC 1918](https://datatracker.ietf.org/doc/html/rfc1918) IP.
4847
- **Load balancer pool**: The load balancer is configured with one [pool](/load-balancing/understand-basics/load-balancing-components/#pools) per tunnel.
49-
- **Load balancer endpoint**: A pool contains one or more endpoints, where each endpoint is a server behind `cloudflared` that is running the application. The load balancing endpoint is defined by the server's private IP address and virtual network (for example, `10.0.0.1 (VNET-1)`).
48+
- **Load balancer endpoint**: A pool contains one or more endpoints, where each endpoint is a server behind `cloudflared` that is running the application. We recommend defining endpoints using the server's private hostname (`server1.internal.local`) to avoid issues with overlapping IP ranges. If you prefer to manage endpoints using their IP, you can assign a distinct [virtual network (VNET)](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) per tunnel so that Load Balancer can deterministically route requests to the correct endpoint.
5049

51-
## 1. Create a Cloudflare Tunnel
50+
## Prerequisites
5251

53-
Skip to [step 2](#2-create-load-balancer-pools) if you have already connected your private networks with Cloudflare Tunnel.
52+
- Your private hostname or IP routes through Cloudflare Tunnel. To learn how to connect your private network, refer to [Connect a private hostname](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-private-hostname/) or [Connect an IP/CIDR](/cloudflare-one/connections/connect-networks/private-net/cloudflared/connect-cidr/).
5453

55-
To create a new tunnel:
56-
57-
<Render file="tunnel/create-tunnel" product="cloudflare-one" />
58-
9. Go to the **CIDR** tab.
59-
10. In **CIDR**, enter the private IP address or CIDR range of your service (for example, `10.0.0.1` or `10.0.0.0/8`).
60-
10. (Optional) Under **Additional settings**, select a virtual network. If you do not select a virtual network, the IP route will be assigned to the `default` network.
61-
62-
:::note
63-
If you need to create a new virtual network, select **Manage virtual networks**. For more information, refer to the [virtual networks](/cloudflare-one/connections/connect-networks/private-net/cloudflared/tunnel-virtual-networks/) documentation.
64-
:::
65-
11. Select **Complete seup**.
66-
67-
You can go to **Networks** > **Routes** to view all of your IP routes and their associated virtual networks.
68-
69-
## 2. Create load balancer pools
54+
## 1. Create load balancer pools
7055

7156
Load balancer pools are logical groupings of endpoints, typically organized by physical datacenter or geographic region. The endpoints in the pool are the destinations where traffic is ultimately routed.
7257

@@ -122,7 +107,7 @@ All endpoints with private IPs must have `virtual_network_id` specified.
122107
</Tabs>
123108

124109

125-
## 3. Create a private load balancer
110+
## 2. Create a private load balancer
126111

127112
1. In the Cloudflare dashboard, go to the **Load Balancing** page.
128113

@@ -138,7 +123,7 @@ All endpoints with private IPs must have `virtual_network_id` specified.
138123

139124
After completing the setup, you will be redirected to the Load Balancing dashboard. You can locate your load balancer using the search bar or by filtering for **Private** load balancers. Be sure to note the load balancer IP as it will be required in the following steps.
140125

141-
## 4. Route the load balancer IP through WARP
126+
## 3. Route the load balancer IP through WARP
142127

143128
In order for WARP clients to connect to your load balancer, the load balancer's IP address must route through the WARP tunnel in your [Split Tunnel settings](/cloudflare-one/connections/connect-devices/warp/configure-warp/route-traffic/split-tunnels/).
144129

@@ -154,7 +139,7 @@ In order for WARP clients to connect to your load balancer, the load balancer's
154139

155140
WARP traffic can now reach your private load balancer. For example, if your load balancer points to a web application, you can test by running `curl <load-balancer-IP>` from the WARP device. This traffic will be distributed over Cloudflare Tunnel to your private endpoints according to your configured steering method.
156141

157-
## 5. (Optional) Assign a hostname to the load balancer
142+
## 4. (Optional) Assign a hostname to the load balancer
158143

159144
If you want your load balancer and its endpoints to be transparently accessible to users via a hostname, you can create a Gateway DNS [Override policy](/cloudflare-one/policies/gateway/dns-policies/#override) that maps the hostname to the load balancer's IP address. This ensures that traffic destined for the hostname resolves to the correct IP.
160145

0 commit comments

Comments
 (0)