Skip to content

Commit 0377a2e

Browse files
authored
Merge pull request #114012 from anavinahar/patch-244
Update concepts.md
2 parents a4fa5da + e1a98e0 commit 0377a2e

File tree

1 file changed

+9
-45
lines changed

1 file changed

+9
-45
lines changed

articles/load-balancer/concepts.md

Lines changed: 9 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.devlang: na
99
ms.topic: overview
1010
ms.tgt_pltfrm: na
1111
ms.workload: infrastructure-services
12-
ms.date: 04/30/2020
12+
ms.date: 05/05/2020
1313
ms.author: allensu
1414

1515
---
@@ -44,56 +44,20 @@ The following image displays the hash-based distribution:
4444

4545
## Application independence and transparency
4646

47-
Load balancer doesn't directly interact with TCP or UDP or the application layer. Any TCP or UDP application scenario can be supported. Load balancer doesn't close or originate flows or interact with the payload of the flow. Load balancer doesn't provide application layer gateway functionality. Protocol handshakes always occur directly between the client and the back-end pool instance. A response to an inbound flow is always a response from a virtual machine. When the flow arrives on the virtual machine, the original source IP address is also preserved.
47+
Load balancer doesn't directly interact with TCP or UDP or the application layer. Any TCP or UDP application scenario can be supported. Load balancer doesn't close or originate flows or interact with the payload of the flow. Load balancer doesn't provide application layer gateway functionality. Protocol handshakes always occur directly between the client and the back-end pool instance. A response to an inbound flow is always a response from a virtual machine. When the flow arrives on the virtual machine, the original source IP address is also preserved.
4848

4949
* Every endpoint is answered by a VM. For example, a TCP handshake occurs between the client and the selected back-end VM. A response to a request to a front end is a response generated by a back-end VM. When you successfully validate connectivity to a front end, you're validating the connectivity throughout to at least one back-end virtual machine.
5050
* Application payloads are transparent to the load balancer. Any UDP or TCP application can be supported.
5151
* Because the load balancer doesn't interact with the TCP payload and provide TLS offload, you can build comprehensive encrypted scenarios. Using load balancer gains large scale-out for TLS applications by ending the TLS connection on the VM itself. For example, your TLS session keying capacity is only limited by the type and number of VMs you add to the back-end pool.
5252

53-
## Outbound connections
54-
Flows from the backend pool to public IPs are mapped to the frontend. Azure translates outbound connections to the public frontend IP address via the load-balancing outbound rule.
53+
## Load Balancer Terminology
54+
| Concept | What does it mean? | Detailed document |
55+
| ---------- | ---------- | ----------|
56+
Outbound connections | Flows from the backend pool to public IPs are mapped to the frontend. Azure translates outbound connections to the public frontend IP address via the load-balancing outbound rule. This configuration has the following advantages. Easy upgrade and disaster recovery of services, because the front end can be dynamically mapped to another instance of the service. Easier access control list (ACL) management. ACLs expressed as front-end IPs don't change as services scale up or down or get redeployed. Translating outbound connections to a smaller number of IP addresses than machines reduces the burden of implementing safe recipient lists.| To learn more about Source Network Address Translation (SNAT) and Azure Load Balancer, see [SNAT and Azure Load Balancer](load-balancer-outbound-connections.md#snat).
57+
Availability Zones | Standard load balancer supports additional abilities in regions where Availability Zones are available. These features are incremental to all standard load balancer provides. Availability Zones configurations are available for both types of Standard load balancer; public and internal.A zone-redundant frontend survives zone failure by using dedicated infrastructure in all of the zones simultaneously. Additionally, you can guarantee a frontend to a specific zone. A zonal frontend is served by dedicated infrastructure in a single zone. Cross-zone load balancing is available for the backend pool. Any virtual machine resource in a virtual network can be part of a backend pool.Basic load balancer doesn't support zones.| Review [detailed discussion of Availability Zones related abilities](load-balancer-standard-availability-zones.md) and [Availability Zones Overview](../availability-zones/az-overview.md) for more information.
58+
| HA Ports | You can configure HA port load-balancing rules to make your application scale and be highly reliable. Load balancing per flow on short-lived ports of the internal load balancer's frontend IP is provided by these rules. The feature is useful when it's impractical or undesirable to specify individual ports. An HA ports rule allows you to create active-passive or active-active n+1 scenarios. These scenarios are for network virtual appliances and any application, which requires large ranges of inbound ports. A health probe can be used to determine which back-ends should be receiving new flows. You can use a Network Security Group to emulate a port range scenario. Basic load balancer doesn't support HA Ports. | Review [detailed discussion of HA Ports](load-balancer-ha-ports-overview.md)
59+
| Multiple frontends | Load balancer supports multiple rules with multiple frontends. Standard Load Balancer expands this capability to outbound scenarios. Outbound rules are the inverse of an inbound rule. The outbound rule creates an association for outbound connections. Standard load balancer uses all frontends associated with a virtual machine resource through a load-balancing rule. Additionally, a parameter on the load-balancing rule allows you to suppress a load-balancing rule for the purposes of outbound connectivity, which allows the selection of specific frontends including none. For comparison, Basic load balancer selects a single frontend at random. There isn't an ability to control which frontend was selected.|
5560

56-
This configuration has the following advantages:
57-
58-
* Easy upgrade and disaster recovery of services, because the front end can be dynamically mapped to another instance of the service.
59-
* Easier access control list (ACL) management. ACLs expressed as front-end IPs don't change as services scale up or down or get redeployed. Translating outbound connections to a smaller number of IP addresses than machines reduces the burden of implementing safe recipient lists.
60-
61-
To learn more about Source Network Address Translation (SNAT) and Azure Load Balancer, see [SNAT and Azure Load Balancer](load-balancer-outbound-connections.md#snat).
62-
63-
## Availability Zones
64-
65-
Standard load balancer supports additional abilities in regions where Availability Zones are available. These features are incremental to all standard load balancer provides. Availability Zones configurations are available for both types of standard load balancer; public and internal.
66-
67-
68-
A zone-redundant frontend survives zone failure by using dedicated infrastructure in all of the zones simultaneously. Additionally, you can guarantee a frontend to a specific zone.
69-
70-
A zonal frontend is served by dedicated infrastructure in a single zone. Cross-zone load balancing is available for the backend pool. Any virtual machine resource in a virtual network can be part of a backend pool.
71-
72-
Basic load balancer doesn't support zones.
73-
Review [detailed discussion of Availability Zones related abilities](load-balancer-standard-availability-zones.md) and [Availability Zones Overview](../availability-zones/az-overview.md) for more information.
74-
75-
## HA Ports
76-
77-
You can configure HA port load-balancing rules to make your application scale and be highly reliable.
78-
79-
Load balancing per flow on short-lived ports of the internal load balancer's frontend IP is provided by these rules.
80-
81-
The feature is useful when it's impractical or undesirable to specify individual ports. An HA ports rule allows you to create active-passive or active-active n+1 scenarios. These scenarios are for network virtual appliances and any application, which requires large ranges of inbound ports. A health probe can be used to determine which back-ends should be receiving new flows. You can use a Network Security Group to emulate a port range scenario.
82-
83-
Basic load balancer doesn't support HA Ports. Review [detailed discussion of HA Ports](load-balancer-ha-ports-overview.md)
84-
85-
>[!IMPORTANT]
86-
> If you are planning to use a network virtual appliance, check with your vendor for guidance on whether their product has been tested with HA Ports and follow their specific guidance for implementation.
87-
88-
## Multiple frontends
89-
90-
Load balancer supports multiple rules with multiple frontends. Standard Load Balancer expands this capability to outbound scenarios.
91-
92-
Outbound rules are the inverse of an inbound rule. The outbound rule creates an association for outbound connections. Standard load balancer uses all frontends associated with a virtual machine resource through a load-balancing rule.
93-
94-
Additionally, a parameter on the load-balancing rule allows you to suppress a load-balancing rule for the purposes of outbound connectivity, which allows the selection of specific frontends including none.
95-
96-
For comparison, Basic load balancer selects a single frontend at random. There isn't an ability to control which frontend was selected.
9761

9862
## <a name = "limitations"></a>Limitations
9963

0 commit comments

Comments
 (0)