Skip to main content

Load balancing

Andy HsuSeptember 7, 2022GuideAdvancedGuideLess than 1 minute

Load balancing

It is required that the file structures in the two storages are exactly the same, and the program will automatically poll all storages for download/request.

Different network disks can be used, but the file directories must be consistent.

  • If the network disk mounted on the main display is inconsistent with the directory tree of the network disk mounted on the load and an error is returned after modifying the network disk mounted on the main display, you can solve it by yourself to keep the directory files of the network disk on the load consistent.

The first is marked with a red box. It is the main mount, which is displayed on the front page. The remaining nine are the first load balancing on the first one.

how to use​

One storage can be added normally, and the other storage can be added with the mount path of the first storage mount path + .balance + any other content.
E.g:

  • Storage 1: test
  • Storage 2: test.balance1
  • Storage 3: test.balance2
  • Storage 4: test.balance3
  • ...
  • Storage n: test.balancen
Kind tips
 Please check the reminder content carefully

1.The new version v3.25.0 has updated the new password method, and the acquisition method has also been changed. For details, please refer to the documentation page of your own installation method
2.v3.25.1 Aliyun_open can choose to mount the backup disk or resource library by itself, for details Click to view for details
3.The new version of AList version greater than v3.22.1 adds single sign-on to automatically register as an AList account, click to view the detailed description
4.139Cloud189CloudFor details of changes, please view the document by yourself, respectively
5.v3.20.1version Breaking Changes View detailed description, go to Configure documentation page
6. AList v3.30.0 will no longer support Win7/Server2008 because Go does not support it. Click to view detailed instructions .
7.After adding the cloud disk, please configure [anti-theft/meta information] and other measures in time to prevent the account from being [frozen/disabled] due to malicious [access/sharing] by [crawlers/others].