403Webshell
Server IP : 104.21.38.3  /  Your IP : 104.23.175.30
Web Server : Apache
System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64
User : www ( 1000)
PHP Version : 7.4.33
Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/nftables/examples/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/doc/nftables/examples/load_balancing.nft
#!/usr/sbin/nft -f

# This example file shows how to implement load balancing using the nftables
# framework.
# This script is meant to be loaded with `nft -f <file>`
# You require linux kernel >= 4.12 and nft >= 0.7
# For up-to-date information please visit https://wiki.nftables.org

flush ruleset

table ip nat {
	chain prerouting {
		type nat hook prerouting priority -300;
		# round-robing load balancing between the 2 IPv4 addresses:
		dnat to numgen inc mod 2 map {
				0 : 192.168.10.100, \
				1 : 192.168.20.200 }
		# emulate flow distribution with different backend weights using intervals:
		dnat to numgen inc mod 10 map {
				0-5 : 192.168.10.100, \
				6-9 : 192.168.20.200 }
		# tcp port based distribution is also possible:
		ip protocol tcp dnat to 192.168.1.100 : numgen inc mod 2 map {
				0 : 4040 ,\
				1 : 4050 }
		# consistent hash-based distribution:
		dnat to jhash ip saddr . tcp dport mod 2 map {
				0 : 192.168.20.100, \
				1 : 192.168.30.100 }
	}
}

table ip raw {
	chain prerouting {
		type filter hook prerouting priority -300;
		# using stateless NAT, round-robing distribution (you could use hashing too):
		tcp dport 80 notrack ip daddr set numgen inc mod 2 map { 0 : 192.168.1.100, 1 : 192.168.1.101 }
	}
}

table netdev mytable {
	chain ingress {
		# mind the NIC devices, they must exist in the system
		type filter hook ingress device eth0 priority 0;
		# using Direct Server Return (DSR), connectionless approach:
		udp dport 53 ether saddr set aa:bb:cc:dd:ff:ee ether daddr set numgen inc mod 2 map {
					0 : aa:aa:aa:aa:aa:aa,
					1 : bb:bb:bb:bb:bb:bb } fwd to eth1
		# using Direct Server Return (DSR), connection-oriented flows:
		 tcp dport 80 ether saddr set aa:bb:cc:dd:ff:ee ether daddr set jhash ip saddr . tcp sport mod 2 map {
					0 : aa:aa:aa:aa:aa:aa,
					1 : bb:bb:bb:bb:bb:bb } fwd to eth1
	}
}

Youez - 2016 - github.com/yon3zu
LinuXploit