Skip to content

Commit 28267e8

Browse files
RoRoJbene2k1jcirinosclwyldecarvalho-doc
authored
feat(lb): add troubleshooting (#4591)
* feat(lb): continue troubleshooting * feat(lb): add more troubleshooting * fix(lb): add troubleshooting * Update pages/load-balancer/troubleshooting/k8s-errors.mdx * Apply suggestions from code review Co-authored-by: Benedikt Rollik <[email protected]> Co-authored-by: Jessica <[email protected]> Co-authored-by: ldecarvalho-doc <[email protected]> * Update pages/load-balancer/troubleshooting/configuration.mdx * Apply suggestions from code review * fix(lb): add index and links --------- Co-authored-by: Benedikt Rollik <[email protected]> Co-authored-by: Jessica <[email protected]> Co-authored-by: ldecarvalho-doc <[email protected]>
1 parent 2587326 commit 28267e8

File tree

9 files changed

+425
-5
lines changed

9 files changed

+425
-5
lines changed

faq/loadbalancer.mdx

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ Yes: Check out our documentation on:
2727

2828
By default, each [public](/load-balancer/concepts/#accessibility) Load Balancer is created automatically with a flexible IPv4 address. This is a public IP that can be held in your account even after you delete your Load Balancer. You can optionally also add an IPv6 address.
2929

30+
**This IP address is fixed and does not risk changing once attached to your Load Balancer**.
31+
3032
Your frontend listens to your Load Balancer's public flexible IP address. In case of a failure of the Load Balancer, a replica Load Balancer is immediately spawned and deployed, and the IP address is automatically rerouted to this replica. This is done automatically, by the Load Balancer control subsystems.
3133

3234
When you delete a Load Balancer, you can choose to keep its flexible IP(s) in your account, to reuse later with a new Load Balancer. These flexible IPs are not compatible with other Scaleway products (e.g. Instances, Elastic Metal servers, Public Gateways): each resource has its own set of flexible IPs.
@@ -35,6 +37,12 @@ When you delete a Load Balancer, you can choose to keep its flexible IP(s) in yo
3537

3638
Each Load Balancer can have one public IPv4 address and one public IPv6 address. Currently, it is not possible to assign more than one of each type of IP to a given Load Balancer.
3739

40+
## How can I move my Instance's flexible IP address to my Load Balancer?
41+
42+
This is not possible: flexible IPs are scoped to the resource-type that they were created for. You can move a flexible IP between different Instances, but not move it to a Load Balancer.
43+
44+
Watch this space for resource-agnostic flexible IPs in the future.
45+
3846
## Do Load Balancers support external IPv6 connections?
3947

4048
Yes, Load Balancer supports both IPv4 and IPv6 addresses at the frontend. IPv6 can also be used to communicate between the Load Balancer and your backend servers.
@@ -60,6 +68,8 @@ To take advantage of multi-cloud, you must choose a compatible Load Balancer off
6068

6169
All protocols based on `TCP` are supported. This includes `database`, `HTTP`, `LDAP`, `IMAP` and so on. You can also specify `HTTP` to benefit from support and features that are exclusive to this protocol.
6270

71+
Scaleway Load Balancer does not currently support `UDP`.
72+
6373
## Is it possible to add security to restrict access to a URL or port on the Load Balancer?
6474

6575
Yes, you can restrict the use of a `TCP` port or `HTTP` URL using ACLs. Find more information in our [ACL documentation](/load-balancer/how-to/create-manage-acls/).
@@ -78,4 +88,8 @@ A health check is one of the core concepts for a well-functioning Load Balancer.
7888

7989
## Can I set up a caching service for my load balanced application?
8090

81-
Yes, this is possible with Scaleway's [Edge Services](/edge-services/) product, currently in Public Beta. By creating an Edge Services pipeline for your Load Balancer, you can access Edge Services caching service reduce load on your origin.
91+
Yes, this is possible with Scaleway's [Edge Services](/edge-services/) product, currently in Public Beta. By creating an Edge Services pipeline for your Load Balancer, you can access Edge Services caching service reduce load on your origin.
92+
93+
## How can I add extra security such as a firewall or anti-DDOS to my Load Balancer?
94+
95+
This will be available soon via [Edge Services](/edge-services/), watch this space.

menu/navigation.json

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3627,6 +3627,22 @@
36273627
},
36283628
{
36293629
"items": [
3630+
{
3631+
"label": "I am having problems configuring my Load Balancer",
3632+
"slug": "configuration"
3633+
},
3634+
{
3635+
"label": "I am experiencing connection problems and HTTP errors with my Load Balancer",
3636+
"slug": "http-connection-errors"
3637+
},
3638+
{
3639+
"label": "I am having problems with my Load Balancer's certificate",
3640+
"slug": "certificates"
3641+
},
3642+
{
3643+
"label": "I am experiencing problems with my Kubernetes Load Balancer",
3644+
"slug": "k8s-errors"
3645+
},
36303646
{
36313647
"label": "Load Balancer Limitations",
36323648
"slug": "load-balancer-limitations"

pages/load-balancer/how-to/add-certificate.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,4 +200,8 @@ Use the <Icon name="delete" /> button to delete unwanted certificates.
200200
If you have more than one certificate for your Load Balancer, it will automatically use the first in the list, regardless of its expiry date. Ensure that you delete any expired certificates, and that the current certificate you want to use is first in the list.
201201
</Message>
202202

203+
## Troubleshooting certificate problems
204+
205+
See our [dedicated troubleshooting documentation](/load-balancer/troubleshooting/certifiates/.)
206+
203207

pages/load-balancer/reference-content/kubernetes-load-balancer.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ Full documentation for creating and configuring a Load Balancer for your cluster
2424
- [Managing Load Balancer IPs](/kubernetes/reference-content/managing-load-balancer-ips/)
2525
- [Using Load Balancer annotations](/kubernetes/reference-content/using-load-balancer-annotations/)
2626
- [Exposing a Kubernetes Kapsule ingress controller service with a Load Balancer](/kubernetes/reference-content/lb-ingress-controller/)
27+
- [Troubleshooting Kubernetes Load Balancers](/load-balancer/troubleshooting/k8s-errors/)
2728

2829
You may also find the following resources helpful:
2930

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
meta:
3+
title: I am having problems with my Load Balancer's certificate
4+
description: Troubleshoot errors that you may experience when creating an SSL/TLS certificate, adding it to your Load Balancer frontend, or successfully handling HTTPS connections.
5+
content:
6+
h1: I am having problems with my Load Balancer's certificate
7+
paragraph: Troubleshoot errors that you may experience when creating an SSL/TLS certificate, adding it to your Load Balancer frontend, or successfully handling HTTPS connections.
8+
tags: load-balancer certificate ssl tls dns
9+
dates:
10+
validation: 2025-03-10
11+
posted: 2025-03-10
12+
categories:
13+
- network
14+
---
15+
16+
## I'm experiencing DNS errors when adding an SSL/TLS certificate
17+
18+
You may be trying to [create or upload](/load-balancer/how-to/add-certificate/) a certificate for your Load Balancer, and receive the following error message:
19+
20+
```
21+
invalid argument(s): dns_name does not respect constraint, <domain> does not resolve to your Load Balancer IP
22+
```
23+
24+
### Cause
25+
26+
The domain name specified does not resolve to the Load Balancer's public IP address.
27+
28+
### Solution
29+
30+
Try the following steps:
31+
32+
- Ensure that a DNS record exists, pointing this domain to the Load Balancer's public IP address.
33+
- Ensure that you have correctly typed the domain name, with no typos or errors.
34+
- If you created the DNS record very recently, DNS propagation might not yet be complete. Wait for 30-60 minutes and try again, to see if the issue resolves itself.
35+
- If you are trying to upload a custom certificate:
36+
- Check the certificate's validity dates and ensure it's not expired or not yet valid.
37+
- If the certificate has wildcards, ensure it covers the correct domain and subdomains. For example, if your certificate covers `*.example.com`, you can use it to secure `subdomain.example.com` but not `sub.subdomain.example.com`. Check the [IETF documentation](https://www.ietf.org/rfc/rfc2818.txt).
38+
- If the error persists, check the DNS entry using a tool like `dig`, to ensure it is resolving correctly.
39+
40+
41+
## I am experiencing HTTP errors when generating a Let's Encrypt SSL/TLS certificate
42+
43+
You may be trying to [generate a Let's Encrypt certificate](/load-balancer/how-to/add-certificate/#how-to-generate-and-add-a-lets-encrypt-certificate) for your Load Balancer, and receive the following error message:
44+
45+
```
46+
HTTP error 400: The port 80 frontend must be associated to an HTTP backend
47+
```
48+
49+
### Cause
50+
51+
Let's Encrypt certificates cannot be created for Load Balancers which have a frontend listening on port 80, but are attached to a **TCP** backend. This is because the Let's Encrypt challenge would fail.
52+
53+
### Solution:
54+
55+
Ensure that your Load Balancer has either:
56+
- An HTTP-protocol-backend attached to a frontend listening on port 80, or
57+
- A TCP-protocol-backend attached to a frontend listening on a port other than 80
58+
59+
Alternatively, create and import your own [custom certificate](/load-balancer/how-to/add-certificate/#how-to-import-a-certificate) for your Load Balancer, rather than generating a Let's Encrypt certificate via Scaleway.
60+
61+
## I added a certificate to my Kubernetes Load Balancer via the Scaleway console, but it is not working correctly
62+
63+
You may have used the Scaleway console attach a certificate to your Kubernetes Kapsule Load Balancer, and then find that the SSL certificate does not work as expected afterwards, with connections lost and HTTPS traffic dropped.
64+
65+
### Cause
66+
67+
Kubernetes Kapsule is a managed service, as are the Load Balancers created as part of the cluster.
68+
Modifying a Kubernetes Load Balancer via the Scaleway console results in non-permanent modifications which are not known to the Kubernetes Kapsule service, and therefore end up being overwritten.
69+
70+
### Solution
71+
72+
Always modify Kubernetes Load Balancers via the cluster's Cloud Controller Manager (CCM), using [Load Balancer annotations](/kubernetes/reference-content/using-load-balancer-annotations/).
73+
74+
The specific annotation to use can be found in the [Scaleway CCM documentation](https://github.com/scaleway/scaleway-cloud-controller-manager/blob/master/docs/loadbalancer-annotations.md#servicebetakubernetesioscw-loadbalancer-certificate-ids).
75+
76+
77+
## I have a different problem related to my Load Balancer SSL/TLS certificate
78+
79+
Check the following documentation:
80+
81+
- [How to add an SSL/TLS certificate](/load-balancer/how-to/add-certificate/)
82+
- [Setting up SSL bridging, offloading or passthrough](/load-balancer/reference-content/ssl-bridging-offloading-passthrough/)
83+
- [Load Balancer API Documentation: Certificates](https://www.scaleway.com/en/developers/api/load-balancer/zoned-api/#path-certificate-get-an-ssltls-certificate)
84+
- [Load Balancer Terraform Documentation: Certificates](https://registry.terraform.io/providers/scaleway/scaleway/latest/docs/resources/lb_certificate)
Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
---
2+
meta:
3+
title: I am having problems configuring my Load Balancer
4+
description: Troubleshoot problems that you may experience when configuring your Load Balancer, such as adding backend servers, setting up Private Networks and dealing with security concerns.
5+
content:
6+
h1: I am having problems configuring my Load Balancer
7+
paragraph: Troubleshoot problems that you may experience when configuring your Load Balancer, such as adding backend servers, setting up Private Networks and dealing with security concerns.
8+
tags: load-balancer configuration backend server error security ip
9+
dates:
10+
validation: 2025-03-06
11+
posted: 2025-03-06
12+
categories:
13+
- network
14+
---
15+
16+
If your problem concerns any of the following, see our specific documentation pages:
17+
18+
- [Troubleshooting certificate configuration](/load-balancer/troubleshooting/certificates/)
19+
- [Setting up SSL bridging, offloading or passthrough](/load-balancer/reference-content/ssl-bridging-offloading-passthrough/)
20+
- [Troubleshooting connection and HTTP errors](/load-balancer/troubleshooting/http-connection-errors/)
21+
- General advice and help for configuring [frontends](/load-balancer/reference-content/configuring-frontends/), [backends](/load-balancer/reference-content/configuring-backends/) and [health checks](/load-balancer/reference-content/configuring-health-checks/)
22+
- [Creating and configuring a Kubernetes Load Balancer](/kubernetes/reference-content/kubernetes-load-balancer/)
23+
24+
## When adding a backend server to my Load Balancer, I get the message: IP is not owned by Scaleway
25+
26+
You may be trying to [add a backend server](/load-balancer/how-to/create-frontends-backends/#configuring-traffic-management) to your Load Balancer's backend, and experience the following error:
27+
28+
`HTTP 404: IP not owned by Scaleway`
29+
30+
### Cause
31+
32+
You are trying to add the IP address of a backend server that is not owned by Scaleway (i.e. is not a Scaleway resource such as an Instance, Elastic Metal server or Managed Database).
33+
34+
### Solution
35+
36+
Only certain Load Balancer types (L and XL) allow you to add non-Scaleway resources as backend servers. This is indicated as "Multi-cloud provider" compatibility in the [Load Balancer creation form](https://console.scaleway.com/load-balancer/lbs/create).
37+
38+
Either:
39+
40+
- [Resize](/load-balancer/how-to/resize-lb/) your Load Balancer to a type that is compatible with multi-cloud backend servers, or
41+
- Use only Scaleway resources as backend servers for your Load Balancer
42+
43+
## When adding a backend server via its private IP address, I get the message: IP doesn't exist
44+
45+
You may be trying to [add a backend server](/load-balancer/how-to/create-frontends-backends/#configuring-traffic-management) to your Load Balancer's backend using the server's private IP address, and experience an error message saying that the IP doesn't exist.
46+
47+
### Cause
48+
49+
You are entering an incorrect IP address for your resource, or using private IP address that is outside the standard range for private networks.
50+
51+
### Solution
52+
53+
- Check that you are entering the correct [private IP address](/vpc/how-to/attach-resources-to-pn/#how-to-view-the-resources-ip-address) for your resource, and that it is attached to the same Private Network as the Load Balancer.
54+
- Verify that you are using a private IP address that is within the standard ranges used for private networks as described in [RFC1918](https://en.wikipedia.org/wiki/Private_network#Private_IPv4_addresses). Only IP addresses from within one of these ranges are supported by Scaleway Load Balancer.
55+
56+
57+
## My Load Balancer's Elastic Metal backend servers added via private IPs are all down
58+
59+
You may add Elastic Metal backend servers to your Load Balancer using their private IP address, and find they are marked as `DOWN` as soon as you add them. You are unable to work out why they are failing their health checks.
60+
61+
### Cause
62+
63+
The Load Balancer is unable to successfully communicate with the Elastic Metal backend servers over the Private Network, resulting in failed health checks.
64+
65+
### Solution
66+
67+
- Check that your health checks and backend servers are correctly configured to work together.
68+
- Check that you have entered the correct [private IP address](/vpc/how-to/attach-resources-to-pn/#how-to-view-the-resources-ip-address) for your Elastic Metal server, and that it is attached to the same Private Network as the Load Balancer.
69+
- Elastic Metal servers require additional manual configuration of their network interface, unlike Instances and other resource types. Ensure you have [followed the necessary configuration steps](/elastic-metal/how-to/use-private-networks/#how-to-configure-the-network-interface-on-your-elastic-metal-server-for-private-networks).
70+
71+
72+
## My Load Balancer's IP address is appearing in the backend application's logs, instead of the real client IP address.
73+
74+
You may find that as requests are passed from the client, through the Load Balancer, to your backend servers, that the client's original IP address is replaced with the Load Balancer's IP address in your backend application's logs. This is problematic if you need the original IP address for localization, security or other purposes.
75+
76+
### Cause
77+
78+
Proxy Protocol has not been activated on your Load Balancer, meaning that information about the original client's connection is not being passed through to the backend servers.
79+
80+
### Solution
81+
82+
Activate [Proxy Protocol](/load-balancer/reference-content/configuring-backends/#proxy-protocol) on your Load Balancer, and ensure that your backend server is [correctly configured](/tutorials/proxy-protocol-v2-load-balancer/) to handle this protocol.
83+
84+
## Security rules are not being applied as expected, and I am having difficulties in filtering incoming traffic through my Load Balancer
85+
86+
You may find that traffic is not being filtered as expected via your Load Balancer, and that Instances in your backend are not dropping unauthorized traffic as expected.
87+
88+
### Cause
89+
90+
Instance security groups and/or Load Balancer ACLs are incorrectly configured.
91+
92+
### Solution
93+
94+
Instance [security groups](instances/how-to/use-security-groups/) should still filter public traffic arriving on your backend server Instances, as long as that traffic is arriving over the public interface. This means the Instance in question must be attached to the Load Balancer via its public IP and not any private IP.
95+
- Ensure that your Instance is attached via its public IP address. If your Instance behind a Load Balancer is attached via a private IP address, the security group rules will not be applied.
96+
- Double check your [security group rules](/instances/how-to/use-security-groups/#how-to-choose-security-group-settings), to verify that they correspond to the required ports, protocols, and IP addresses configured for your Load Balancer
97+
- To filter incoming traffic to your backend servers **as it passes through the Load Balancer**, use [Load Balancer ACLs](/load-balancer/how-to/create-manage-acls/).

0 commit comments

Comments
 (0)