Load balancing Red Hat OpenStack

Updated on November 27, 2025
Published on June 30, 2025

Benefits of load balancing OpenStack

Load balancing is crucial for Red Hat OpenStack Platform (RHOSP) deployments in order to ensure the high availability, scalability, and performance of applications and services running within the cloud.

  • High availability (HA): Load balancers ensure uninterrupted service by performing health checks and distributing network traffic. They proactively monitor the health of backend servers, so if one goes offline it is temporarily removed from the pool until it recovers, preventing requests from being sent to failing servers. This allows the load balancer to direct incoming traffic across multiple, healthy backend instances of an application or service. 
  • Scalability: By adding more backend instances as demand grows, load balancing can enable applications and services to be scaled horizontally. This means they can handle more users and requests without performance becoming compromised.
  • Performance: Load balancers can reduce latency by distributing traffic evenly, preventing bottlenecks and leading to faster user response times. They also ensure that all available resources are utilized efficiently, preventing server overload or underuse.Different load balancing algorithms, such as round-robin, least connections, and source IP, can be used to optimize distribution based on unique need and use cases.
  • Security: Load balancers can enhance security and performance by handling SSL/TLS encryption and decryption, a CPU-intensive task that offloads work from backend servers and centralizes certificate management. This also reduces the attack surface on individual application instances. Load balancers can also provide DDoS protection by absorbing and filtering malicious traffic before it can reach and overwhelm the backend servers. 
  • Simplified operations: A load balancer simplifies the management of backend infrastructure by offering a single access point, which hides the complexity of individual servers from users and applications. This also streamlines maintenance, allowing updates and offline maintenance to be performed on a specific backend instance without disrupting the availability of the service as a whole.

About Red Hat OpenStack

Red Hat OpenStack (RHOSP) is an open source platform that uses pooled virtual resources to build and manage private and public clouds. 

This cloud computing platform virtualizes resources from industry-standard hardware, organizes them into clouds, and manages them so users can access what they need—when they need it.

Why Loadbalancer.org for Red Hat OpenStack?

Loadbalancer’s intuitive Enterprise Application Delivery Controller (ADC) is designed to save time and money with a clever, not complex, WebUI. 

Easily configure, deploy, manage, and maintain our Enterprise load balancer, reducing complexity and the risk of human error. For a difference you can see in just minutes.

And with WAF and GSLB included straight out-of-the-box, there’s no hidden costs, so the prices you see on our website are fully transparent. 

More on what’s possible with Loadbalancer.org

How to load balance Red Hat OpenStack

The load balancer can be deployed in four fundamental ways: Layer 4 DR mode, Layer 4 NAT mode, Layer 4 SNAT mode, and Layer 7 Reverse Proxy (Layer 7 SNAT mode).

For Red Hat OpenStack, Layer 7 Reverse Proxy is recommended.

Virtual service (VIP) requirements

To provide load balancing and HA for Red Hat OpenStack, the following VIPs are required:

VIPModePort(s)Persistence Mode
aodhL7 Reverse Proxy (TCP)8042None
ceilometerL7 Reverse Proxy (TCP)8777None
cinderL7 Reverse Proxy (TCP)8776None
glance_apiL7 Reverse Proxy (TCP)9292None
glance_registryL7 Reverse Proxy (TCP)9191None
gnocchiL7 Reverse Proxy (TCP)8041None
heat_apiL7 Reverse Proxy (TCP)8004None
heat_cfnL7 Reverse Proxy (TCP)8000None
heat_cloudwatchL7 Reverse Proxy (TCP)8003None
horizonL7 Reverse Proxy (HTTP)80HTTP Cookie
keystone_adminL7 Reverse Proxy (TCP)35357None
keystone_admin_shhL7 Reverse Proxy (TCP)22None
keystone_publicL7 Reverse Proxy (TCP)5000None
mysqlL7 Reverse Proxy (TCP)3306Last Successful
neutronL7 Reverse Proxy (TCP)9696None
nova_ec2L7 Reverse Proxy (TCP)8773None
nova_metadataL7 Reverse Proxy (TCP)8775None
nova_novncproxyL7 Reverse Proxy (TCP)6080Source IP
nova_osapiL7 Reverse Proxy (TCP)8774None
nova_placementL7 Reverse Proxy (TCP)8778None
pankoL7 Reverse Proxy (TCP)8779None
redisL7 Reverse Proxy (TCP)6379Last Successful
swift_proxy_serverL7 Reverse Proxy (TCP)8080None

Load balancing deployment concept

Once the load balancer is deployed, clients connect to the Virtual Services (VIPs) rather than connecting directly to one of the Red Hat OpenStack servers. These connections are then load balanced across the OpenStack servers to distribute the load according to the load balancing algorithm selected.

DC OpenStack, Network Diagram, Loadbalancer.org

Note

The load balancer can be deployed as a single unit, although Loadbalancer.org recommends a clustered pair for resilience & high availability. Please refer to the section Configuring HA Adding a Secondary Appliance in the administration manual for more details on configuring a clustered pair.

Topology

Layer 7 Reverse Proxy can be deployed using either a one-arm or two-arm configuration. For two-arm deployments, eth1 is typically used for client side connections and eth0 is used for Real Server connections, although this is not mandatory since any interface can be used for any purpose. For more on one and two-arm topology see Topologies & Load Balancing Methods.

About Layer 7 Reverse Proxy

Layer 7 Reverse Proxy uses a proxy (HAProxy) at the application layer. Inbound requests are terminated on the load balancer and HAProxy generates a new corresponding request to the chosen Real Server. As a result, Layer 7 is typically not as fast as the Layer 4 methods. Layer 7 is typically chosen when either enhanced options such as SSL termination, cookie based persistence, URL rewriting, header insertion/deletion etc. are required, or when the network topology prohibits the use of the Layer 4 methods. The image below shows an example network diagram for this mode.

The image below shows an example Layer 7 Reverse Proxy network diagram:

Because Layer 7 Reverse Proxy is a full proxy, Real Servers in the cluster can be on any accessible network including across the Internet or WAN. 

Layer 7 Reverse Proxy is not transparent by default, i.e. the Real Servers will not see the source IP address of the client, they will see the load balancer’s own IP address by default, or any other local appliance IP address if preferred (e.g. the VIP address). This can be configured per Layer 7 VIP. If required, the load balancer can be configured to provide the actual client IP address to the Real Servers in 2 ways. Either by inserting a header that contains the client’s source IP address, or by modifying the Source Address field of the IP packets and replacing the IP address of the load balancer with the IP address of the client. For more information on these methods please refer to Transparency at Layer 7. 

Requires no mode-specific configuration changes to the load balanced Real Servers. 

Port translation is possible with Layer 7 Reverse Proxy, e.g. VIP:80 → RIP:8080 is supported. 

You should not use the same RIP:PORT combination for Layer 7 Reverse Proxy VIPs and Layer 4 SNAT mode VIPs because the required firewall rules conflict.