UDP Health Checks

NGINX Plus can continually test your upstream servers that handle UDP network traffic (DNS, RADIUS, syslog), avoid the servers that have failed, and gracefully add the recovered servers into the load‑balanced group.

Prerequisites

  • You have configured an upstream group of servers that handles UDP network traffic in the stream {} context, for example:

    stream {
        #...
        upstream dns_upstream {
            server 192.168.136.130:53;
            server 192.168.136.131:53;
            server 192.168.136.132:53;
        }
        #...
    }
  • You have configured a server that passes UDP datagrams to the upstream server group:

    stream {
        #...
        server {
            listen          53 udp;
            proxy_pass      dns_upstream;
            proxy_timeout   1s;
            proxy_responses 1;
            error_log       logs/dns.log;
        }
        #...
    }

    See TCP and UDP Load Balancing for details.

Passive UDP health checks

NGINX Open Source or F5 NGINX Plus can mark the server as unavailable and stop sending UDP datagrams to it for some time if the server replies with an error or times out.

The number of consecutive failed connection attempts within a certain time period is set with the max_fails parameter for an upstream server (default value is 1).

The time period is set with the fail_timeout parameter (default value is 10 seconds). The parameter also sets the amount of time that NGINX considers the server unavailable after marking it so.

So if a connection attempt times out or fails at least once in a 10‑second period, NGINX marks the server as unavailable for 10 seconds. The example shows how to set these parameters to 2 failures within 60 seconds:

upstream dns_upstream {
    server 192.168.136.130:53 fail_timeout=60s;
    server 192.168.136.131:53 fail_timeout=60s;
}

Active UDP health checks

Active Health Checks allow testing a wider range of failure types and are available only for NGINX Plus. For example, instead of waiting for an actual TCP request from a DNS client to fail before marking the DNS server as down (as in passive health checks), NGINX Plus will send special health check requests to each upstream server and check for a response that satisfies certain conditions. If a connection to the server cannot be established, the health check fails, and the server is considered unhealthy. NGINX Plus does not proxy client connections to unhealthy servers. If more than one health check is defined, the failure of any check is enough to consider the corresponding upstream server unhealthy.

To enable active health checks:

  1. In the upstream group, specify a shared memory zone with the zone directive – a special area where the NGINX Plus worker processes share state information about counters and connections. In the zone directive, specify the zone name (dns_zone in the example) and the zone size (64k in the example):

    stream {
        #...
        upstream dns_upstream {
            zone   dns_zone 64k;
            server 192.168.136.130:53;
            server 192.168.136.131:53;
            server 192.168.136.132:53;
        }
        #...
    }
  2. In the server block that forwards traffic to the upstream group (via proxy_pass), specify the udp parameter to the health_check directive:

    stream {
        #...
        server {
             listen       53 udp;
             proxy_pass   dns_upstream;
             health_check udp;
        }
        #...
    }

A basic UDP health check assumes that NGINX Plus sends the “nginx health check” string to an upstream server and expects the absence of ICMP “Destination Unreachable” message in response. You can configure your own health check tests in the match {} block. See The “match {}” Configuration Block for details.

Fine-Tuning UDP Health Checks

You can fine‑tune the health check by specifying the following parameters to the health_check directive:

  • interval– How often (in seconds) NGINX Plus sends health check requests (default is 5 seconds)
  • passes– Number of consecutive health checks the server must respond to to be considered healthy (default is 1)
  • fails– Number of consecutive health checks the server must fail to respond to to be considered unhealthy (default is 1)
server {
    listen       53 udp;
    proxy_pass   dns_upstream;
    health_check interval=20 passes=2 fails=2 udp;
}

In the example, the time between UDP health checks is increased to 20 seconds, the server is considered unhealthy after 2 consecutive failed health checks, and the server needs to pass 2 consecutive checks to be considered healthy again.

The “match {}” configuration block

A basic UDP health check assumes that NGINX Plus sends the “nginx health check” string to an upstream server and expects the absence of ICMP “Destination Unreachable” message in response. You can configure your own health check tests that will verify server responses. These tests are defined within the match {} configuration block.

  1. In the top‑level stream {} context, specify the match {} block and set its name, for example, udp_test:

    stream {
        #...
        match  udp_test {
            #...
        }
    }
  2. Refer to the block from the health_check directive by including the match parameter to specify the name of the match {} block:

    stream {
        #...
        server {
            listen       53 udp;
            proxy_pass   dns_upstream;
            health_check match=udp_test udp;
        }
        #...
    }
  3. In the match {} block, specify conditions or tests under which a health check succeeds. This is done with send and expect parameters:

    • send– The text string or hexadecimal literals (“/x” followed by two hex digits) to send to the server
    • expect– Literal string or regular expression that the data returned by the server needs to match

    These parameters can be used in different combinations, but no more than one send and one expect parameter can be specified at a time.

Usage scenarios

NTP health checks

To fine‑tune health checks for NTP, you should specify both send and expect parameters with the following text strings:

match ntp {
    send \xe3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;
    expect ~* \x24;
}

Complete NTP health check configuration example


stream {
    upstream ntp_upstream {
        zone   ntp_zone 64k;
        server 192.168.136.130:53;
        server 192.168.136.131:53;
        server 192.168.136.132:53;
}
    server {
        listen          53 udp;
        proxy_pass      ntp_upstream;
        health_check    match=ntp udp;
        proxy_timeout   1s;
        proxy_responses 1;
        error_log       logs/ntp.log;
        }

    match ntp {
        send \xe3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00;
        expect ~* \x24;
    }
}

DNS health checks

DNS health checks can be enhanced to perform real DNS lookup queries. You can craft a valid DNS query packet, send it to the upstream server, and inspect the response to determine health.

The process includes three steps:

Create a CNAME record

First, create a CNAME record on your DNS server for a health check that points to the target website.

For example, if you are using BIND self-hosted DNS solution on a Linux server:

  • Open the zone file in a text editor:
sudo nano /etc/bind/zones/db.example.com
  • Add a CNAME record, making healthcheck.example.com resolve to healthy.svcs.example.com:
healthcheck    IN    CNAME    healthy.svcs.example.com.
  • Save the file and reload the DNS service:
sudo systemctl reload bind9

Once the CNAME record is live and resolvable, you can craft a DNS query packet that represents a DNS lookup and can be used in the send directive.

Construct a raw DNS query packet

The send parameter of the match block allows you to send raw UDP packets for health checks. To query your CNAME record, you need to construct a valid DNS query packet according to the DNS protocol message format, including a header and question section.

The DNS Query packet can be created using DNS packet builders, such as Python Scapy or dnslib, or packet analyzers, such as tcpdump or Wireshark. If using a packet analyzer, extract only the DNS layer, removing Ethernet, IP, and UDP-related headers.

This is the raw DNS query of healthcheck.example.com, represented as one line in Hex with \x prefixes:

\x00\x01\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x0b\x68\x65\x61\x6c\x74\x68\x63\x68\x65\x63\x6b\x07\x65\x78\x61\x6d\x70\x6c\x65\x03\x63\x6f\x6d\x00\x00\x01\x00\x01

where:

HEX Description
\x00\x01 Transaction ID: 0x0001
\x01\x00 Flags: Standard query, recursion desired
\x00\x01 Questions: 1
\x00\x00 Answer RRs: 0
\x00\x00 Authority RRs: 0
\x00\x00 Additional RRs: 0
\x0b\x68\x65\x61\x6c\x74\x68\x63\x68\x65\x63\x6b “healthcheck”
\x07\x65\x78\x61\x6d\x70\x6c\x65 “example”
\x03\x63\x6f\x6d “com”
\x00 end of name
\x00\x01 Type: A
\x00\x01 Class: IN

Configure the match block for DNS lookup

Finally, specify the match block in the NGINX configuration file to pair the raw query with an expected response. The send directive should contain the DNS query packet, while expect directive should contain a matching DNS record in the DNS server’s response:

match dns {
    send \x00\x01\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x0b\x68\x65\x61\x6c\x74\x68\x63\x68\x65\x63\x6b\x07\x65\x78\x61\x6d\x70\x6c\x65\x03\x63\x6f\x6d\x00\x00\x01\x00\x01;
    expect  ~* "healthy.svcs.example.com";
}

Complete DNS health check configuration example


stream {
    upstream dns_upstream {
        zone   dns_zone 64k;
        server 192.168.136.130:53;
        server 192.168.136.131:53;
        server 192.168.136.132:53;
}
    server {
        listen          53 udp;
        proxy_pass      dns_upstream;
        health_check    match=dns udp;
        proxy_timeout   1s;
        proxy_responses 1;
        error_log       logs/dns.log;
        }

    match dns {
        # make sure appropriate CNAME record exists
        send \x00\x01\x01\x00\x00\x01\x00\x00\x00\x00\x00\x00\x0b\x68\x65\x61\x6c\x74\x68\x63\x68\x65\x63\x6b\x07\x65\x78\x61\x6d\x70\x6c\x65\x03\x63\x6f\x6d\x00\x00\x01\x00\x01;
        expect  ~* "healthy.svcs.example.com";
    }
}

See also