"because the node instance is out of load balancing, so the request is blocked."
If they are in the same VPC, you should check the security group that you assigned to your instances. In particular, if you want to allow connections on ports 443 and / or 80 on a standalone instance to be accessible from the security group assigned to load balancing instances, call this "sg-load_balancer" (check your AWS Console to see what it represents is the actual security group identifier).
To check this - select a security group for a single instance, pay attention to the tabs at the bottom of the page. Go to the Inbox tab. You should see a set of rules ... You want to make sure that they are for HTTP and / or HTTPS, and instead of putting the IP address in "Source", set the security group for load balancing instances - Let's start with sg- , and the console will provide you with a drop-down list to show valid entries.
If you do not see a security group for load balancing instances, there are good chances that they are not in the same VPC. To check - raise the console and find the VPC ID on each node. This will start with vpc_ . They must be the same. If not, you will have to configure rules and routing tables to allow traffic between them ... More slightly, take a look at a similar problem to get some ideas on how to solve this problem: Allow Amazon VPC A to switch to a new private subnet on VPC B?
source share