Skip to content

Commit 2d843b5

Browse files
authored
Merge pull request #125103 from ArieHein/Spelling-Wave-29
Spelling Fixes
2 parents d453c36 + 2d3a234 commit 2d843b5

14 files changed

+16
-16
lines changed

articles/load-balancer/basic/quickstart-basic-internal-load-balancer-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ These VMs are added to the backend pool of the load balancer that was created ea
235235
| Setting | VM 2 |
236236
| ------- | ----- |
237237
| Name | **myVM2** |
238-
| Availability set | Select the existing **myAvailabiltySet** |
238+
| Availability set | Select the existing **myAvailabilitySet** |
239239
| Network security group | Select the existing **myNSG** |
240240

241241
[!INCLUDE [ephemeral-ip-note.md](~/reusable-content/ce-skilling/azure/includes/ephemeral-ip-note.md)]

articles/load-balancer/create-custom-http-health-probe-howto.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ In this section, you create the load balancer rule that uses the HTTP health pro
134134
| **Protocol** | Select **TCP** |
135135
| **Port** | Enter **5000** |
136136
| **Backend port** | Enter **5000** |
137-
| **Health probe** | Select **HTTP_Health (HTTP:5000/health_checkk/)** |
137+
| **Health probe** | Select **HTTP_Health (HTTP:5000/health_check/)** |
138138
| **Session persistence** | Select **None** |
139139
| **Idle timeout (minutes)** | Enter **5** |
140140

articles/load-balancer/inbound-nat-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ There are two types of inbound NAT rule available for Azure Load Balancer, versi
2727
2828
### Inbound NAT rule V1
2929

30-
Inbound NAT rule V1 is defined for a single target virtual machine. Inbound NAT pools are feature of Inbound NAT rules V1 and automatically creates Inbound NAT rules per VMSS intance. The load balancer's frontend IP address and the selected frontend port are used for connections to the virtual machine.
30+
Inbound NAT rule V1 is defined for a single target virtual machine. Inbound NAT pools are feature of Inbound NAT rules V1 and automatically creates Inbound NAT rules per VMSS instance. The load balancer's frontend IP address and the selected frontend port are used for connections to the virtual machine.
3131

3232
>[!Important]
3333
> On September 30, 2027, Inbound NAT rules v1 will be retired. If you are currently using Inbound NAT rules v1, make sure to upgrade to Inbound NAT rules v2 prior to the retirement date.

articles/load-balancer/ipv6-add-to-existing-vnet-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ Add IPv6 address ranges to the virtual network and subnet hosting the VMs as fol
105105

106106
```azurepowershell-interactive
107107
#Add IPv6 ranges to the VNET and subnet
108-
#Retreive the VNET object
108+
#Retrieve the VNET object
109109
$vnet = Get-AzVirtualNetwork -ResourceGroupName $rg.ResourceGroupName -Name "myVnet"
110110
111111
#Add IPv6 prefix to the VNET

articles/load-balancer/load-balancer-common-deployment-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This article describes some common Azure Load Balancer deployment errors and pro
3636
| LoadBalancerInUseByVirtualMachineScaleSet | The Load Balancer resource is in use by a Virtual Machine Scale Set and can't be deleted. Use the Azure Resource Manager ID provided in the error message to search for the Virtual Machine Scale Set in order to delete it. |
3737
| SpecifiedAllocatedOutboundPortsForOutboundRuleIsNotAMultipleOfEight | The number of specified [SNAT](outbound-rules.md) ports is not a multiply of 8.
3838
| SpecifiedAllocatedOutboundPortsForOutboundRuleExceedsTotalNumberOfAllowedPortsPerRule | The number of specified [SNAT](outbound-rules.md) ports is greater than 64000.
39-
| SpecifiedAllocatedOutboundPortsForOutboundRuleExceedsTotalNumberOfAvailablePorts | The number of specified [SNAT](outbound-rules.md) ports is greater than currently avaliable.
39+
| SpecifiedAllocatedOutboundPortsForOutboundRuleExceedsTotalNumberOfAvailablePorts | The number of specified [SNAT](outbound-rules.md) ports is greater than currently available.
4040

4141
## Next steps
4242

articles/load-balancer/load-balancer-manage-health-status.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following table describes the success reason codes where the backend state i
3737

3838
| **Reason Code** | **Portal displayed reason** | **Description** |
3939
|-------------|-------------------------|-------------|
40-
| **Up_Probe_Succes**s | The backend instance is responding to health probe successfully. | Your backend instance is responding to the health probe successfully. |
40+
| **Up_Probe_Success** | The backend instance is responding to health probe successfully. | Your backend instance is responding to the health probe successfully. |
4141
| **Up_Probe_AllDownIsUp** | The backend instance is considered healthy due to enablement of *NoHealthyBackendsBehavior*. | Health probe state of the backend instance is ignored because *NoHealthyBackendsBehavior* is enabled. The backend instance is considered healthy and can receive traffic. |
4242
| **Up_Probe_ApproachingUnhealthyThreshold** | Health probe is approaching an unhealthy threshold but backend instance remains healthy based on last response. | The most recent probe has failed to respond but the backend instance remains healthy enough based on earlier responses. |
4343
| **Up_Admin**| The backend instance is healthy due to Admin State set to *Up*. | Health probe state of the backend instance is ignored because the Admin State is set to *UP*. The backend instance is considered healthy and can receive traffic. |
@@ -97,7 +97,7 @@ Health status can be retrieved on a per load balancing rule basis. This is suppo
9797
To retrieve the health status information via REST API, you need to do a two request process.
9898

9999
> [!NOTE]
100-
> Using the REST API method requres that you have a **Bearer access token** for autorization. For assistance retrieving the access token, see [Get-AzAccessToken](/powershell/module/az.accounts/get-azaccesstoken) for details.
100+
> Using the REST API method requires that you have a **Bearer access token** for authorization. For assistance retrieving the access token, see [Get-AzAccessToken](/powershell/module/az.accounts/get-azaccesstoken) for details.
101101
102102
1. Use the following POST request to obtain the Location URI from the Response Headers.
103103

articles/load-balancer/load-balancer-monitor-metrics-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Complete reference documentation and other samples for retrieving metrics using
1919

2020
## Table of metric names via CLI
2121

22-
When you use CLI, Load Balancer metrics may use a different metric name for the CLI parameter value. When specifying the metric name via the `--metric dimension` parameter, use the CLI metric name instead. For example, the metric Data path availability would be used by specifying a parameter of `--metric VipAvaialbility`.
22+
When you use CLI, Load Balancer metrics may use a different metric name for the CLI parameter value. When specifying the metric name via the `--metric dimension` parameter, use the CLI metric name instead. For example, the metric Data path availability would be used by specifying a parameter of `--metric VipAvailability`.
2323

2424
Here's a table of common Load Balancer metrics, the CLI metric name, and recommend aggregation values for queries:
2525

articles/load-balancer/load-balancer-nat-pool-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ An [inbound NAT rule](inbound-nat-rules.md) is used to forward traffic from a lo
1818
1919
## NAT rule version 1
2020

21-
[Version 1](inbound-nat-rules.md) is the legacy approach for assigning an Azure Load Balancer’s frontend port to each backend instance. Rules are applied to the backend instance’s network interface card (NIC). For Azure Virtual Machine Scale Sets (VMSS) instances, inbound NAT rules are automatically created/deleted as new instances are scaled up/down. For VMSS instanes use the `Inbound NAT Pools` property to manage Inbound NAT rules version 1.
21+
[Version 1](inbound-nat-rules.md) is the legacy approach for assigning an Azure Load Balancer’s frontend port to each backend instance. Rules are applied to the backend instance’s network interface card (NIC). For Azure Virtual Machine Scale Sets (VMSS) instances, inbound NAT rules are automatically created/deleted as new instances are scaled up/down. For VMSS instances use the `Inbound NAT Pools` property to manage Inbound NAT rules version 1.
2222

2323
## NAT rule version 2
2424

articles/load-balancer/load-balancer-outbound-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ A public IP assigned to a VM is a 1:1 relationship (rather than 1: many) and imp
8989
In Azure, virtual machines created in a virtual network without explicit outbound connectivity defined are assigned a default outbound public IP address. This IP address enables outbound connectivity from the resources to the Internet. This access is referred to as [default outbound access](../virtual-network/ip-services/default-outbound-access.md). This method of access is **not recommended** as it's insecure and the IP addresses are subject to change.
9090

9191
>[!Important]
92-
>On September 30, 2025, default outbound access for new deployments will be retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/upgrade-to-standard-sku-public-ip-addresses-in-azure-by-30-september-2025-basic-sku-will-be-retired/). It is recommended to use one the explict forms of connectivity as shown in options 1-3 above.
92+
>On September 30, 2025, default outbound access for new deployments will be retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/upgrade-to-standard-sku-public-ip-addresses-in-azure-by-30-september-2025-basic-sku-will-be-retired/). It is recommended to use one the explicit forms of connectivity as shown in options 1-3 above.
9393
9494
### What are SNAT ports?
9595

articles/load-balancer/manage-admin-state-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,7 @@ In this section, you learn how to remove an existing admin state from an existin
367367
# [Azure PowerShell](#tab/azurepowershell)
368368

369369
1. Connect to your Azure subscription with Azure PowerShell.
370-
2. Remove an existing backend pool instance. This is done by setting the admin state value to **NONE** with [New-AzLoadBlancerBackendAddressConfig](/powershell/module/az.network/new-azloadbalancerbackendaddressconfig). Replace the values in brackets with the names of the resources in your configuration.
370+
2. Remove an existing backend pool instance. This is done by setting the admin state value to **NONE** with [New-AzLoadBalancerBackendAddressConfig](/powershell/module/az.network/new-azloadbalancerbackendaddressconfig). Replace the values in brackets with the names of the resources in your configuration.
371371

372372
```azurepowershell
373373

0 commit comments

Comments
 (0)