Packets hit the edge of your network at full velocity. You need Kerberos authentication to protect services. You need a load balancer to distribute traffic evenly, keep nodes healthy, and avoid downtime. The two must coexist without breaking trust.
A Kerberos load balancer sits between clients and application servers. It inspects TCP connections, routes requests, and preserves the encrypted authentication sequence. Kerberos uses tickets for mutual authentication. These tickets depend on precise time, consistent hostnames, and stable session flow. Any load balancer in front of Kerberos-protected systems must respect these rules.
If a load balancer rewrites host headers or breaks session stickiness, the Kerberos handshake fails. The solution is a configuration that ensures clients always reach the same backend after authentication. This is called session affinity or sticky sessions. In Kerberos environments, it is often based on source IP or a layer 7 cookie. Without it, service tickets cannot be reused and every request forces a re-login.
Health checks must also be tuned. A misconfigured probe can trigger false failovers during peak load. Kerberos services are sensitive to latency during authentication exchanges. Use lightweight probes on dedicated endpoints to ensure accuracy without overhead.
SSL offloading is compatible with Kerberos, but requires that the load balancer pass the original client’s hostname to the backend. This is often done with the Host header or SNI. Failure here breaks principal name matching and denies access.