Skip to content

Commit 2d67309

Browse files
authored
Merge pull request #113409 from anavinahar/patch-242
Update load-balancer-standard-availability-zones.md
2 parents 9f70946 + 9ddd9c4 commit 2d67309

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/load-balancer/load-balancer-standard-availability-zones.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.devlang: na
1111
ms.topic: article
1212
ms.tgt_pltfrm: na
1313
ms.workload: infrastructure-services
14-
ms.date: 08/07/2019
14+
ms.date: 04/30/2020
1515
ms.author: allensu
1616
---
1717

@@ -25,17 +25,17 @@ A Load Balancer resource itself is regional and never zonal. The granularity of
2525
In the context of availability zones, the behavior and properties of a Load Balancer rule are described as zone-redundant or zonal. Zone-redundant and zonal describe the zonality of a property. In the context of Load Balancer, zone-redundant always means *multiple zones* and zonal means isolating the service to a *single zone*.
2626
Both public and internal Load Balancer support zone-redundant and zonal scenarios and both can direct traffic across zones as needed (*cross-zone load-balancing*).
2727

28-
### Frontend
28+
## Frontend
2929

3030
A Load Balancer frontend is a frontend IP configuration referencing either a public IP address resource or a private IP address within the subnet of a virtual network resource. It forms the load balanced endpoint where your service is exposed.
3131
A Load Balancer resource can contain rules with zonal and zone-redundant frontends simultaneously.
3232
When a public IP resource or a private IP address has been guaranteed to a zone, the zonality (or lack thereof) isn't mutable. If you wish to change or omit the zonality of a public IP or private IP address frontend, you need to recreate the public IP in the appropriate zone. Availability zones do not change the constraints for multiple frontend, review [multiple frontends for Load Balancer](load-balancer-multivip-overview.md) for details for this ability.
3333

34-
#### Zone redundant
34+
### Zone redundant
3535

3636
In a region with availability zones, a Standard Load Balancer frontend can be zone-redundant. Zone-redundant means that all inbound or outbound flows are served by multiple availability zones in a region simultaneously using a single IP address. DNS redundancy schemes aren't required. A single frontend IP address can survive zone failure and can be used to reach all (non-impacted) backend pool members irrespective of the zone. One or more availability zones can fail and the data path survives as long as one zone in the region remains healthy. The frontend's single IP address is served simultaneously by multiple independent infrastructure deployments in multiple availability zones. This doesn't mean hitless data path, but any retries or reestablishment will succeed in other zones not impacted by the zone failure.
3737

38-
#### Optional zone isolation
38+
### Optional zone isolation
3939

4040
You can choose to have a frontend guaranteed to a single zone, which is known as a *zonal frontend*. This means any inbound or outbound flow is served by a single zone in a region. Your frontend shares fate with the health of the zone. The data path is unaffected by failures in zones other than where it was guaranteed. You can use zonal frontends to expose an IP address per Availability Zone.
4141

@@ -47,27 +47,27 @@ For a public Load Balancer frontend, you add a *zones* parameter to the public I
4747

4848
For an internal Load Balancer frontend, add a *zones* parameter to the internal Load Balancer frontend IP configuration. The zonal frontend causes the Load Balancer to guarantee an IP address in a subnet to a specific zone.
4949

50-
### Cross-zone Load-Balancing
50+
## Cross-zone Load-Balancing
5151

5252
Cross-zone load-balancing is the ability of Load Balancer to reach a backend endpoint in any zone and is independent of frontend and its zonality. Any load balancing rule can target backend instance in any availability zone or regional instances.
5353

5454
You need to take care to construct your scenario in a manner which expressed an availability zones notion. For example, you need guarantee your virtual machine deployment within a single zone or multiple zones, and align zonal frontend and zonal backend resources to the same zone. If you cross availability zones with only zonal resources, the scenario will work but may not have a clear failure mode with respect to availability zones.
5555

56-
### Backend
56+
## Backend
5757

5858
Load Balancer works with virtual machines instances. These can be standalone, availability sets, or virtual machine scale sets. Any virtual machine instance in a single virtual network can be part of the backend pool irrespective of whether or not it was guaranteed to a zone or which zone was guaranteed to.
5959

6060
If you wish to align and guarantee your frontend and backend with a single zone, only place virtual machines within the same zone into the respective backend pool.
6161

6262
If you wish to address virtual machines across multiple zones, simply place virtual machines from multiple zones into the same backend pool. When using virtual machine scale sets, you can place one or more virtual machine scale sets into the same backend pool. And each of these virtual machine scale sets can be in a single or multiple zones.
6363

64-
### Outbound connections
64+
## Outbound connections
6565

6666
The same zone-redundant and zonal properties apply to [outbound connections](load-balancer-outbound-connections.md). A zone-redundant public IP address used for outbound connections is served by all zones. A zonal public IP address is served only by the zone it is guaranteed in. Outbound connection SNAT port allocations survive zone failures and your scenario will continue to provide outbound SNAT connectivity if not impacted by zone failure. This may require transmissions or for connections to be re-established for zone-redundant scenarios if a flow was served by an impacted zone. Flows in zones other than the impacted zones are not affected.
6767

6868
The SNAT port preallocation algorithm is the same with or without availability zones.
6969

70-
### Health probes
70+
## Health probes
7171

7272
Your existing health probe definitions remain as they are without availability zones. However, we've expanded the health model at an infrastructure level.
7373

0 commit comments

Comments
 (0)