UDP

User Datagram Protocol, or UDP, is an established low-latency connection communication protocol between applications.

UDP does not provide error checking, packet sequencing, nor does it signal a destination before it delivers data, which makes UDP less reliable than TCP, but less expensive in terms of bandwidth. UDP is best for time-sensitive transmissions; however, packets are at risk of being lost in transit.

UDP is typically used for urgent transmissions such as live video or DNS lookups. Another example is online gaming, which requires quick communication between users.

Droplets

Droplet network traffic restricts TCP and UDP traffic on port 11211 inbound from external networks due to the Memcached amplification attacks in March 2018.

Load Balancer

UDP is typically used for urgent transmissions such as live video or DNS lookups. Another example is online gaming, which requires quick communication between users.

UDP balancing is available for applications that require more time-sensitive transmission. Forwarding rules using UDP require you to set both the entry and target protocols to UDP. When using UDP, the load balancer requires that you set up a health check with a port that uses TCP, HTTP, or HTTPS to work properly.

Because UDP is a stateless protocol, the load balancer maintains its own session state in order to route return traffic from Droplets back to the client. When no traffic is sent or received for one minute, the load balancer triggers a session timeout.

When using UDP, the load balancer assigns incoming connections to healthy target Droplets using the source IP of the client. This means that all subsequent requests from the same client are received on the same target Droplet. If a target Droplet becomes unhealthy or you add or remove target Droplets, the load balancer assigns clients new target Droplets.

When using UDP in forwarding rules, the maximum payload size of a UDP packet sent to the load balancer is 1424 bytes.

UDP Articles

Configure advanced load balancer settings for sticky sessions, health checks, and always-on SSL.
Create, modify, or delete firewall rules to restrict Droplets’ inbound and outbound traffic based on ports, sources, and destinations.
Create a cloud firewall to restrict network traffic to and from specified Droplets.