Skip to content

Commit 1de58e1

Browse files
authored
Merge pull request #105373 from asudbring/lbnewart
Updated concept art for overview and concepts page
2 parents 1e83f82 + f0012d5 commit 1de58e1

File tree

10 files changed

+707
-8
lines changed

10 files changed

+707
-8
lines changed

articles/load-balancer/concepts-limitations.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,9 @@ For more information, see [Configure the distribution mode for Azure Load Balanc
6868

6969
The following image displays the hash-based distribution:
7070

71-
![Hash-based distribution](./media/load-balancer-overview/load-balancer-distribution.png)
71+
<p align="center">
72+
<img src="./media/load-balancer-overview/load-balancer-distribution.svg" width="512" title="Hash-based distribution">
73+
</p>
7274

7375
*Figure: Hash-based distribution*
7476

@@ -130,9 +132,11 @@ A public Load Balancer maps the public IP address and port of incoming traffic t
130132
131133
The following figure shows a load-balanced endpoint for web traffic that is shared among three VMs for the public and TCP port 80. These three VMs are in a load-balanced set.
132134

133-
![Public Load Balancer example](./media/load-balancer-overview/IC727496.png)
135+
<p align="center">
136+
<img src="./media/load-balancer-overview/load-balancer-http.svg" width="256" title="Public load balancer">
137+
</p>
134138

135-
*Figure: Balancing web traffic by using a public Load Balancer*
139+
*Figure: Balancing web traffic by using a public load balancer*
136140

137141
Internet clients send webpage requests to the public IP address of a web app on TCP port 80. Azure Load Balancer distributes the requests across the three VMs in the load-balanced set. For more information about Load Balancer algorithms, see [Load Balancer concepts](concepts-limitations.md#load-balancer-concepts).
138142

@@ -149,7 +153,10 @@ An internal Load Balancer enables the following types of load balancing:
149153
* **For multi-tier applications**: Load balancing for internet-facing multi-tier applications where the back-end tiers aren't internet-facing. The back-end tiers require traffic load balancing from the internet-facing tier. See the next figure.
150154
* **For line-of-business applications**: Load balancing for line-of-business applications that are hosted in Azure without additional load balancer hardware or software. This scenario includes on-premises servers that are in the set of computers whose traffic is load balanced.
151155

152-
![Internal Load Balancer example](./media/load-balancer-overview/IC744147.png)
156+
157+
<p align="center">
158+
<img src="./media/load-balancer-overview/load-balancer.svg" width="256" title="Public load balancer">
159+
</p>
153160

154161
*Figure: Balancing multi-tier applications by using both public and internal Load Balancer*
155162

articles/load-balancer/load-balancer-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ A **[public load balancer](./concepts-limitations.md#publicloadbalancer)** can p
2727

2828
An **[internal (or private) load balancer](./concepts-limitations.md#internalloadbalancer)** is used where private IPs are needed at the frontend only. Internal load balancers are used to load balance traffic inside a virtual network. A load balancer frontend can be accessed from an on-premises network in a hybrid scenario.
2929

30-
<div align="center">
31-
<img src='./media/load-balancer-overview/IC744147.png'>
32-
</div>
30+
<p align="center">
31+
<img src="./media/load-balancer-overview/load-balancer.svg" width="512" title="Azure Load Balancer">
32+
</p>
3333

3434
*Figure: Balancing multi-tier applications by using both public and internal Load Balancer*
3535

@@ -68,7 +68,7 @@ Key scenarios that you can accomplish using Standard Load Balancer include:
6868

6969
### <a name="securebydefault"></a>Secure by default
7070

71-
Standard Load Balancer is built on the zero trust network security model at its core. Standard Load Balancer secure by default and is part of your virtual network. The virtual network is a private and isolated network. This means Standard Load Balancers and Standard Public IP addresses are closed to inbound flows unless opened by Network Security Groups. NSGs are used to explicitly permit and whitelist allowed traffic. If you do not have an NSG on a subnet or NIC of your virtual machine resource, traffic is not allowed to reach this resource. To learn more about NSGs and how to apply them for your scenario, see [Network Security Groups](../virtual-network/security-overview.md).
71+
Standard Load Balancer is built on the zero trust network security model at its core. Standard Load Balancer secure by default and is part of your virtual network. The virtual network is a private and isolated network. This means Standard Load Balancers and Standard Public IP addresses are closed to inbound flows unless opened by Network Security Groups. NSGs are used to explicitly permit allowed traffic. If you do not have an NSG on a subnet or NIC of your virtual machine resource, traffic is not allowed to reach this resource. To learn more about NSGs and how to apply them for your scenario, see [Network Security Groups](../virtual-network/security-overview.md).
7272
Basic Load Balancer is open to the internet by default.
7373

7474

Binary file not shown.
Binary file not shown.
-19.5 KB
Loading

articles/load-balancer/media/load-balancer-overview/load-balancer-distribution.svg

Lines changed: 256 additions & 0 deletions
Loading
5.67 KB
Loading

articles/load-balancer/media/load-balancer-overview/load-balancer-http.svg

Lines changed: 114 additions & 0 deletions
Loading
17.7 KB
Loading

articles/load-balancer/media/load-balancer-overview/load-balancer.svg

Lines changed: 322 additions & 0 deletions
Loading

0 commit comments

Comments
 (0)