HTTPS listeners are best suited for applications that require encrypted transmission. Load balancers decrypt HTTPS requests before routing them to backend servers, which then send the processed requests back to load balancers for encryption before they are sent to clients.
Parameter |
Description |
Example Value |
---|---|---|
Name |
Specifies the listener name. |
listener-pnqy |
Frontend Protocol |
Specifies the protocol that will be used by the load balancer to receive requests from clients. |
HTTPS |
Frontend Port |
Specifies the port that will be used by the load balancer to receive requests from clients. The port number ranges from 1 to 65535. |
80 |
SSL Authentication |
Specifies how you want the clients and backend servers to be authenticated. There are two options: One-way authentication or Mutual authentication.
|
One-way authentication |
Server Certificate |
Specifies the certificate that will be used by the backend server to authenticate the client when HTTPS is used as the frontend protocol. Both the certificate and private key are required. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
CA Certificate |
Specifies the certificate that will be used by the backend server to authenticate the client when HTTPS is used as the frontend protocol. A CA certificate is issued by a certificate authority (CA) and used to verify the certificate issuer. If HTTPS mutual authentication is required, HTTPS connections can be established only when the client provides a certificate issued by a specific CA. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
Enable SNI |
Specifies whether to enable SNI when HTTPS is used as the frontend protocol. SNI is an extension to TLS and is used when a server uses multiple domain names and certificates. This allows the client to submit the domain name information while sending an SSL handshake request. After the load balancer receives the request, the load balancer queries the corresponding certificate based on the domain name and returns it to the client. If no certificate is found, the load balancer will return the default certificate. For details, see SNI Certificate (for HTTPS Listeners). |
N/A |
SNI Certificate |
Specifies the certificate associated with the domain name when the frontend protocol is HTTPS and SNI is enabled. Select an existing certificate or create one. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
Access Control |
Specifies how access to the listener is controlled. The following options are available (for details, see Access Control):
|
Whitelist |
IP Address Group |
Specifies the IP address group associated with a whitelist or blacklist. If there is no IP address group, create one first. For more information, see Creating an IP Address Group. |
ipGroup-b2 |
Transfer Client IP Address |
Specifies whether to transmit IP addresses of the clients to backend servers. This function is enabled for dedicated load balancers by default and cannot be disabled. |
Enabled |
Advanced Forwarding |
Specifies whether to enable the advanced forwarding policy. You can add advanced forwarding policies to HTTP or HTTPS listeners to forward requests to different backend server groups based on HTTP request method, HTTP header, query string, or CIDR block in addition to domain names and URLs. |
Enabled |
Advanced Settings |
||
Security Policy |
Specifies the security policy you can use if you select HTTPS as the frontend protocol. For more information, see TLS Security Policy. |
TLS-1-0 |
HTTP/2 |
Specifies whether you want to use HTTP/2 if you select HTTPS for Frontend Protocol. For details, see HTTP/2. |
N/A |
Transfer Load Balancer EIP |
Specifies whether to store the EIP bound to the load balancer in the X-Forwarded-ELB-IP header field and pass this field to backend servers. |
N/A |
Idle Timeout |
Specifies the length of time for a connection to keep alive, in seconds. If no request is received within this period, the load balancer closes the connection and establishes a new one with the client when the next request arrives. The idle timeout duration ranges from 0 to 4000. |
60 |
Request Timeout |
Specifies the length of time (in seconds) after which the load balancer closes the connection if the load balancer does not receive a request from the client. The request timeout duration ranges from 1 to 300. |
60 |
Response Timeout |
Specifies the length of time (in seconds) after which the load balancer sends a 504 Gateway Timeout error to the client if the load balancer receives no response from the backend server after routing a request to the backend server and receives no response after attempting to route the same request to other backend servers. The request timeout duration ranges from 1 to 300. NOTE:
If you have enabled sticky sessions and the backend server does not respond within the response timeout duration, the load balancer returns 504 Gateway Timeout to the clients. |
60 |
Tag |
Adds tags to the listener. Each tag is a key-value pair, and the tag key is unique. |
N/A |
Description |
Provides supplementary information about the listener. You can enter a maximum of 255 characters. |
N/A |
Parameter |
Description |
Example Value |
---|---|---|
Backend Server Group |
Specifies a group of servers with the same features to receive requests from the load balancer. Two options are available:
|
Create new |
Backend Server Group Name |
Specifies the name of the backend server group. |
server_group-sq4v |
Backend Protocol |
Specifies the protocol that will be used by backend servers to receive requests. The backend protocol can be HTTP or HTTPS and changed be changed between the two options. |
HTTP |
Load Balancing Algorithm |
Specifies the algorithm that will be used by the load balancer to distribute traffic. The following options are available:
NOTE:
|
Weighted round robin |
Sticky Session |
Specifies whether to enable sticky sessions. If you enable sticky sessions, all requests from a client during one session are sent to the same backend server. This parameter is optional and can be enabled only if you have selected Weighted round robin for Load Balancing Algorithm. |
N/A |
Sticky Session Type |
Specifies the type of sticky sessions for HTTP and HTTPS listeners.
|
Load balancer cookie |
Stickiness Duration (min) |
Specifies the minutes that sticky sessions are maintained. You can enable sticky sessions only if you select Weighted round robin for Load Balancing Algorithm.
|
20 |
Slow Start |
Specifies whether to enable slow start, which is disabled by default. After you enable slow start, the load balancer linearly increases the proportion of requests to send to backend servers in this mode. When the slow start duration elapses, the load balancer sends full share of requests to backend servers and exits the slow start mode. For details, see Slow Start (Dedicated Load Balancers). |
N/A |
Slow Start Duration |
Specifies how long the slow start will last. The duration ranges from 30 to 1200, in seconds, and the default value is 30. |
30 |
Description |
Provides supplementary information about the backend server group. You can enter a maximum of 255 characters. |
N/A |
Parameter |
Description |
Example Value |
---|---|---|
Health Check |
Specifies whether to enable health checks. If the health check is enabled, click |
N/A |
Advanced Settings |
||
Health Check Protocol |
Specifies the protocol that will be used by the load balancer to check the health of backend servers. If the backend protocol is HTTP or HTTPS, the health check protocol can be TCP, HTTP, or HTTPS. |
HTTP |
Domain Name |
Specifies the domain name that will be used for health checks. This parameter is available when you set the health check protocol to HTTP or HTTPS.
|
www.elb.com |
Health Check Port |
Specifies the port that will be used by the load balancer to check the health of backend servers. The port number ranges from 1 to 65535. NOTE:
This parameter is optional. If you do not specify a health check port, a port of the backend server will be used for health checks by default. If you specify a port, it will be used for health checks. |
80 |
Path |
Specifies the health check URL, which is the destination on backend servers for health checks. This parameter is available only when you set the health check protocol to HTTP or HTTPS. The path must start with a slash (/) and can contain 1 to 80 characters. The path can contain letters, digits, hyphens (-), slashes (/), periods (.), percent signs (%), ampersands (&), and the following special characters: _~';@$*+,=!:() NOTE:
Example: If the URL is http://www.example.com/chat/try/, the health check path is /chat/try/. If the URL is http://192.168.63.187:9096/chat/index.html, the health check path is /chat/index.html. |
/index.html |
Interval (s) |
Specifies the maximum time between two consecutive health checks, in seconds. The interval ranges from 1 to 50. |
5 |
Timeout (s) |
Specifies the maximum time required for waiting for a response from the health check, in seconds. The timeout duration ranges from 1 to 50. |
3 |
Maximum Retries |
Specifies the maximum number of health check retries. The value ranges from 1 to 10. |
3 |
Parameter |
Description |
Example Value |
---|---|---|
Name |
Specifies the listener name. |
listener-pnqy |
Frontend Protocol |
Specifies the protocol that will be used by the load balancer to receive requests from clients. |
HTTPS |
Frontend Port |
Specifies the port that will be used by the load balancer to receive requests from clients. The port number ranges from 1 to 65535. |
80 |
SSL Authentication |
Specifies whether how you want the clients and backend servers to be authenticated. There are two options: One-way authentication or Mutual authentication.
|
One-way authentication |
CA Certificate |
Specifies the certificate used by the server to authenticate the client when HTTPS is used as the frontend protocol. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
Server Certificate |
Specifies the certificate used by the server to authenticate the client when HTTPS is used as the frontend protocol. Both the certificate and private key are required. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
Enable SNI |
Specifies whether to enable SNI when HTTPS is used as the frontend protocol. SNI is an extension to TLS and is used when a server uses multiple domain names and certificates. This allows the client to submit the domain name information while sending an SSL handshake request. After the load balancer receives the request, the load balancer queries the corresponding certificate based on the domain name and returns it to the client. If no certificate is found, the load balancer will return the default certificate. For details, see SNI Certificate (for HTTPS Listeners). |
N/A |
SNI Certificate |
Specifies the certificate associated with the domain name when the frontend protocol is HTTPS and SNI is enabled. Select an existing certificate or create one. For details, see Creating, Modifying, or Deleting a Certificate. |
N/A |
Access Control |
Specifies how access to the listener is controlled. The following options are available (for details, see Access Control):
|
Whitelist |
IP Address Group |
Specifies the IP address group associated with a whitelist or blacklist. If there is no IP address group, create one first. For more information, see Creating an IP Address Group. |
ipGroup-b2 |
Transfer Client IP Address |
Specifies whether to transmit IP addresses of the clients to backend servers. This function is enabled by default and cannot be disabled. |
Enabled |
Advanced Settings |
||
Security Policy |
Specifies the security policy you can use if you select HTTPS as the frontend protocol. There are four options. For more information, see TLS Security Policy. |
TLS-1-2 |
HTTP/2 |
Specifies whether you want to use HTTP/2 if you select HTTPS for Frontend Protocol. For details, see HTTP/2. |
N/A |
Transfer Load Balancer EIP |
Specifies whether to store the EIP bound to the load balancer in the X-Forwarded-ELB-IP header field and pass this field to backend servers. Enable this option if you want to transparently transmit the EIP of the load balancer to backend servers. |
N/A |
Idle Timeout |
Specifies the length of time for a connection to keep alive, in seconds. If no request is received within this period, the load balancer closes the connection and establishes a new one with the client when the next request arrives. The idle timeout duration ranges from 0 to 4000. |
60 |
Request Timeout |
Specifies the length of time (in seconds) after which the load balancer closes the connection if the load balancer does not receive a request from the client. The request timeout duration ranges from 1 to 300. |
60 |
Response Timeout |
Specifies the length of time (in seconds) after which the load balancer sends a 504 Gateway Timeout error to the client if the load balancer receives no response from the backend server after routing a request to the backend server and receives no response after attempting to route the same request to other backend servers. The request timeout duration ranges from 1 to 300. NOTE:
If you have enabled sticky sessions and the backend server does not respond within the response timeout duration, the load balancer returns 504 Gateway Timeout to the clients. |
60 |
Tag |
Adds tags to the listener. Each tag is a key-value pair, and the tag key is unique. |
N/A |
Description |
Provides supplementary information about the listener. You can enter a maximum of 255 characters. |
N/A |
Parameter |
Description |
Example Value |
---|---|---|
Backend Server Group |
Specifies a group of servers with the same features to receive requests from the load balancer. Two options are available:
|
Create new |
Backend Server Group Name |
Specifies the name of the backend server group. |
server_group-sq4v |
Backend Protocol |
Specifies the protocol used by backend servers to receive requests. The backend protocol is HTTP by default and cannot be changed. |
HTTP |
Load Balancing Algorithm |
Specifies the algorithm used by the load balancer to distribute traffic. The following options are available:
NOTE:
|
Weighted round robin |
Sticky Session |
Specifies whether to enable sticky sessions. If you enable sticky sessions, all requests from a client during one session are sent to the same backend server. NOTE:
You can enable sticky sessions only if you have selected Weighted round robin for Load Balancing Algorithm. |
N/A |
Sticky Session Type |
Specifies the type of sticky sessions for HTTP and HTTPS listeners.
|
Load balancer cookie |
Cookie Name |
Specifies the cookie name. If you select Application cookie, enter a cookie name. |
cookieName-qsps |
Description |
Provides supplementary information about the backend server group. You can enter a maximum of 255 characters. |
N/A |
Parameter |
Description |
Example Value |
---|---|---|
Health Check |
Specifies whether to enable health checks. If the health check is enabled, click |
N/A |
Advanced Settings |
||
Health Check Protocol |
Specifies the protocol that will be used by the load balancer to check the health of backend servers. There are two options: TCP and HTTP. |
HTTP |
Domain Name |
Specifies the domain name that will be used for health checks. This parameter is available when the health check protocol is HTTP.
|
www.elb.com |
Health Check Port |
Specifies the port that will be used by the load balancer to check the health of backend servers. The port number ranges from 1 to 65535. NOTE:
By default, the service port on each backend server is used. You can also specify a port for health checks. |
80 |
Path |
Specifies the health check URL. This parameter is available when the health check protocol is HTTP. The path can contain 1 to 80 characters and must start with a slash (/). The path can contain letters, digits, hyphens (-), slashes (/), periods (.), question marks (?), percent signs (%), ampersands (&), and underscores (_). NOTE:
Example: If the URL is http://www.example.com/chat/try/, the health check path is /chat/try/. If the URL is http://192.168.63.187:9096/chat/index.html, the health check path is /chat/index.html. |
/index.html |
Interval (s) |
Specifies the maximum time between two consecutive health checks, in seconds. The interval ranges from 1 to 50. |
5 |
Timeout (s) |
Specifies the maximum time required for waiting for a response from the health check, in seconds. The timeout duration ranges from 1 to 50. |
3 |
Maximum Retries |
Specifies the maximum number of health check retries. The value ranges from 1 to 10. |
3 |