Skip to content

Commit 3161ce1

Browse files
authored
Merge pull request #291532 from mbender-ms/lb-screenshot-review-pt2
load balancer - screenshot removal - Pt2
2 parents 25a9138 + 12eb70c commit 3161ce1

23 files changed

+66
-119
lines changed

articles/load-balancer/manage-inbound-nat-rules.md

Lines changed: 25 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-load-balancer
77
ms.topic: how-to
8-
ms.date: 06/26/2024
8+
ms.date: 12/06/2024
99
ms.custom: template-how-to, devx-track-azurepowershell, devx-track-azurecli,engagement-fy23
1010
---
1111

@@ -15,9 +15,9 @@ An inbound NAT rule is used to forward traffic from a load balancer frontend to
1515

1616
There are two types of inbound NAT rule:
1717

18-
* Inbound NAT rule V1 for VMs - Targets a single machine in the backend pool of the load balancer
18+
- **Inbound NAT rule V1 for virtual machines**: Targets a single machine in the backend pool of the load balancer.
1919

20-
* Inbound NAT rule V2 for VMs and VMSS- Targets multiple virtual machines in the backend pool of the load balancer
20+
- **Inbound NAT rule V2 for virtual machines and virtual machine scale sets**: Targets multiple virtual machines in the backend pool of the load balancer.
2121

2222
In this article, you learn how to add and remove an inbound NAT rule for both types. You learn how to change the frontend port allocation in a multiple instance inbound NAT rule. You can choose from the Azure portal, PowerShell, or CLI examples.
2323

@@ -30,7 +30,7 @@ In this article, you learn how to add and remove an inbound NAT rule for both ty
3030
[!INCLUDE [azure-cli-prepare-your-environment.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
3131

3232

33-
## Inbound NAT rule V1 for VMs
33+
## Inbound NAT rule V1 for virtual machines
3434

3535
Choose this option to configure a rule for a single VM. Select Azure portal, PowerShell, or CLI for instructions.
3636

@@ -48,8 +48,6 @@ In this example, you create an inbound NAT rule to forward port **500** to backe
4848

4949
5. Select **+ Add** in **Inbound NAT rules** to add the rule.
5050

51-
:::image type="content" source="./media/manage-inbound-nat-rules/add-rule.png" alt-text="Screenshot of the inbound NAT rules page for Azure Load Balancer":::
52-
5351
6. Enter or select the following information in **Add inbound NAT rule**.
5452

5553
| Setting | Value |
@@ -66,27 +64,23 @@ In this example, you create an inbound NAT rule to forward port **500** to backe
6664

6765
7. Leave the rest of the settings at the defaults and select **Add**.
6866

69-
:::image type="content" source="./media/manage-inbound-nat-rules/add-single-instance-rule.png" alt-text="Screenshot of the create inbound NAT rule page":::
70-
7167
# [**PowerShell**](#tab/inbound-nat-rule-powershell)
7268

73-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
69+
In this example, you create an inbound NAT rule to forward port **500** to backend port **443**.
7470

75-
Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
71+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
7672

77-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
73+
- Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
74+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
7875

79-
Use [Get-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/get-azloadbalancerinboundnatruleconfig) to place the newly created inbound NAT rule information into a variable.
76+
- Use [Get-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/get-azloadbalancerinboundnatruleconfig) to place the newly created inbound NAT rule information into a variable.
8077

81-
Use [Get-AzNetworkInterface](/powershell/module/az.network/get-aznetworkinterface) to place the network interface information into a variable.
78+
- Use [Get-AzNetworkInterface](/powershell/module/az.network/get-aznetworkinterface) to place the network interface information into a variable.
8279

83-
Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to add the newly created inbound NAT rule to the IP configuration of the network interface.
80+
- Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to add the newly created inbound NAT rule to the IP configuration of the network interface.
8481

8582
To save the configuration to the network interface, use [Set-AzNetworkInterface](/powershell/module/az.network/set-aznetworkinterface).
8683

87-
88-
89-
9084
```azurepowershell
9185
## Place the load balancer information into a variable for later use. ##
9286
$slb = @{
@@ -140,9 +134,9 @@ $NIC | Set-AzNetworkInterface
140134

141135
In this example, you will create an inbound NAT rule to forward port **500** to backend port **443**. You will then attach the inbound NAT rule to a VM's NIC
142136

143-
Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
137+
- Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
144138

145-
Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-config/inbound-nat-rule) to add the inbound NAT rule to a VM's NIC
139+
- Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-config/inbound-nat-rule) to add the inbound NAT rule to a VM's NIC
146140

147141

148142
```azurecli
@@ -165,7 +159,7 @@ Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-co
165159
```
166160
---
167161

168-
## Inbound NAT rule V2 for VM and VMSS
162+
## Inbound NAT rule V2 for virtual machines and virtual machine scale sets
169163
Choose this option to configure a rule with a range of ports to a backend pool of virtual machines. Select Azure portal, PowerShell, or CLI for instructions.
170164

171165
# [**Portal**](#tab/inbound-nat-rule-portal)
@@ -182,8 +176,6 @@ In this example, you create an inbound NAT rule to forward a range of ports star
182176

183177
5. Select **+ Add** in **Inbound NAT rules** to add the rule.
184178

185-
:::image type="content" source="./media/manage-inbound-nat-rules/add-rule.png" alt-text="Screenshot of the inbound NAT rules page for Azure Load Balancer":::
186-
187179
6. Enter or select the following information in **Add inbound NAT rule**.
188180

189181
| Setting | Value |
@@ -198,18 +190,15 @@ In this example, you create an inbound NAT rule to forward a range of ports star
198190
| Protocol | Select **TCP**. |
199191

200192
7. Leave the rest at the defaults and select **Add**.
201-
202-
:::image type="content" source="./media/manage-inbound-nat-rules/add-inbound-nat-rule.png" alt-text="Screenshot of the add inbound NAT rules page":::
203193

204194
# [**PowerShell**](#tab/inbound-nat-rule-powershell)
205195

206196
In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter `-FrontendPortRangeEnd` with a value of **1000**. This setting limits the backend pool to **500** virtual machines.
207197

208-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
209-
210-
Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
198+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
211199

212-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer)
200+
- Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
201+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer)
213202

214203
```azurepowershell
215204
## Place the load balancer information into a variable for later use. ##
@@ -239,7 +228,7 @@ $lb | Set-AzLoadBalancer
239228

240229
In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter `--frontend-port-range-end` with a value of **1000**. This setting limits the backend pool to **500** virtual machines.
241230

242-
Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
231+
- Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
243232

244233
```azurecli
245234
az network lb inbound-nat-rule create \
@@ -273,21 +262,17 @@ To accommodate more virtual machines in the backend pool in a multiple instance
273262

274263
5. Select the inbound NAT rule you wish to change. In this example, it's **myInboundNATrule**.
275264

276-
:::image type="content" source="./media/manage-inbound-nat-rules/select-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule overview.":::
277-
278265
6. In the properties of the inbound NAT rule, change the value in **Maximum number of machines in backend pool** to **1000**.
279266

280267
7. Select **Save**.
281268

282-
:::image type="content" source="./media/manage-inbound-nat-rules/change-frontend-ports.png" alt-text="Screenshot of inbound NAT rule properties page.":::
283-
284269
# [**PowerShell**](#tab/inbound-nat-rule-powershell)
285270

286271
To accommodate more virtual machines in the backend pool in a multiple instance rule, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter `-FrontendPortRangeEnd` to **1500**. This setting increases the maximum number of machines in the backend pool to **1000**.
287272

288-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
273+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
289274

290-
To change the port allocation, use [Set-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/set-azloadbalancerinboundnatruleconfig).
275+
- To change the port allocation, use [Set-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/set-azloadbalancerinboundnatruleconfig).
291276

292277
```azurepowershell
293278
## Place the load balancer information into a variable for later use. ##
@@ -315,7 +300,7 @@ $lb | Set-AzLoadBalancerInboundNatRuleConfig @rule
315300

316301
To accommodate more virtual machines in the backend pool, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter `--frontend-port-range-end` to **1500**. This setting increases the maximum number of machines in the backend pool to **1000**
317302

318-
Use [az network lb inbound-nat-rule update](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-update) to change the frontend port allocation.
303+
- Use [az network lb inbound-nat-rule update](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-update) to change the frontend port allocation.
319304

320305
```azurecli
321306
az network lb inbound-nat-rule update \
@@ -342,12 +327,8 @@ Port mappings for the virtual machines in the backend pool can be viewed by usin
342327

343328
5. Select **myInboundNATrule** or your inbound NAT rule.
344329

345-
:::image type="content" source="./media/manage-inbound-nat-rules/view-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule page.":::
346-
347330
6. Scroll to the **Port mapping** section of the inbound NAT rule properties page.
348331

349-
:::image type="content" source="./media/manage-inbound-nat-rules/view-port-mappings.png" alt-text="Screenshot of inbound NAT rule port mappings.":::
350-
351332
## Remove an inbound NAT rule
352333

353334
# [**Portal**](#tab/inbound-nat-rule-portal)
@@ -366,17 +347,13 @@ In this example, you remove an inbound NAT rule.
366347

367348
6. Select **Delete**.
368349

369-
:::image type="content" source="./media/manage-inbound-nat-rules/remove-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule removal.":::
370-
371350
# [**PowerShell**](#tab/inbound-nat-rule-powershell)
372351

373352
In this example, you remove an inbound NAT rule.
374353

375-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
376-
377-
To remove the inbound NAT rule, use [Remove-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/remove-azloadbalancerinboundnatruleconfig).
378-
379-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
354+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
355+
- To remove the inbound NAT rule, use [Remove-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/remove-azloadbalancerinboundnatruleconfig).
356+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
380357

381358
```azurepowershell
382359
## Place the load balancer information into a variable for later use. ##
@@ -397,7 +374,7 @@ $lb | Set-AzLoadBalancer
397374

398375
In this example, you remove an inbound NAT rule.
399376

400-
Use [az network lb inbound-nat-rule delete](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-delete) to remove the rule.
377+
- Use [az network lb inbound-nat-rule delete](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-delete) to remove the rule.
401378

402379
```azurecli
403380
az network lb inbound-nat-rule delete \

articles/load-balancer/manage-probes-how-to.md

Lines changed: 13 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-load-balancer
77
ms.topic: how-to
8-
ms.date: 06/26/2024
8+
ms.date: 12/06/2024
99
ms.custom: template-how-to
1010
---
1111

1212
# Manage health probes for Azure Load Balancer using the Azure portal
1313

14-
Azure Load Balancer uses health probes to monitor the health of backend instances. In this article, you'll learn how to manage health probes for Azure Load Balancer.
14+
Azure Load Balancer uses health probes to monitor the health of backend instances. In this article, you learn how to manage health probes for Azure Load Balancer.
1515

1616
There are three types of health probes:
1717

@@ -25,11 +25,11 @@ Health probes have the following properties:
2525
| Health Probe configuration | Details |
2626
| --- | --- |
2727
| Name | Name of the health probe. This is a name you get to define for your health probe |
28-
| Protocol | Protocol of health probe. This is the protocol type you would like the health probe to leverage. Available options are: TCP, HTTP, HTTPS |
28+
| Protocol | Protocol of health probe. This is the protocol type you would like the health probe to use. Available options are: TCP, HTTP, HTTPS |
2929
| Port | Port of the health probe. The destination port you would like the health probe to use when it connects to the virtual machine to check the virtual machine's health status. You must ensure that the virtual machine is also listening on this port (that is, the port is open). |
3030
| Interval (seconds) | Interval of health probe. The amount of time (in seconds) between consecutive health check attempts to the virtual machine |
3131
| Used by | The list of load balancer rules using this specific health probe. You should have at least one rule using the health probe for it to be effective |
32-
| Path | The URI used for requesting health status from the virtual machine instance by the health probe (only applicable for HTTP(s) probes).
32+
| Path | The URI used for requesting health status from the virtual machine instance by the health probe (only applicable for HTTPs probes).
3333

3434
>[!IMPORTANT]
3535
>Load Balancer health probes originate from the IP address 168.63.129.16 and must not be blocked for probes to mark your instance as up. To see this probe traffic within your backend instance, review [the Azure Load Balancer FAQ](./load-balancer-faqs.yml).
@@ -45,11 +45,11 @@ Health probes have the following properties:
4545

4646
## TCP health probe
4747

48-
In this section, you'll learn how to add and remove a TCP health probe. A public load balancer is used in the examples.
48+
In this section, you learn how to add and remove a TCP health probe. A public load balancer is used in the examples.
4949

5050
### Add a TCP health probe
5151

52-
In this example, you'll create a TCP health probe to monitor port 80.
52+
In this example, you create a TCP health probe to monitor port 80.
5353

5454
1. Sign in to the [Azure portal](https://portal.azure.com).
5555

@@ -61,8 +61,6 @@ In this example, you'll create a TCP health probe to monitor port 80.
6161

6262
5. Select **+ Add** in **Health probes** to add a probe.
6363

64-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
65-
6664
6. Enter or select the following information in **Add health probe**.
6765

6866
| Setting | Value |
@@ -76,7 +74,7 @@ In this example, you'll create a TCP health probe to monitor port 80.
7674

7775
### Remove a TCP health probe
7876

79-
In this example, you'll remove a TCP health probe.
77+
In this example, you remove a TCP health probe.
8078

8179
1. Sign in to the [Azure portal](https://portal.azure.com).
8280

@@ -90,15 +88,13 @@ In this example, you'll remove a TCP health probe.
9088

9189
6. Select **Delete**.
9290

93-
:::image type="content" source="./media/manage-probes-how-to/remove-tcp-probe.png" alt-text="Screenshot of TCP probe removal.":::
94-
9591
## HTTP health probe
9692

97-
In this section, you'll learn how to add and remove an HTTP health probe. A public load balancer is used in the examples.
93+
In this section, you learn how to add and remove an HTTP health probe. A public load balancer is used in the examples.
9894

9995
### Add an HTTP health probe
10096

101-
In this example, you'll create an HTTP health probe.
97+
In this example, you create an HTTP health probe.
10298

10399
1. Sign in to the [Azure portal](https://portal.azure.com).
104100

@@ -110,8 +106,6 @@ In this example, you'll create an HTTP health probe.
110106

111107
5. Select **+ Add** in **Health probes** to add a probe.
112108

113-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
114-
115109
6. Enter or select the following information in **Add health probe**.
116110

117111
| Setting | Value |
@@ -126,7 +120,7 @@ In this example, you'll create an HTTP health probe.
126120

127121
### Remove an HTTP health probe
128122

129-
In this example, you'll remove an HTTP health probe.
123+
In this example, you remove an HTTP health probe.
130124

131125
1. Sign in to the [Azure portal](https://portal.azure.com).
132126

@@ -140,15 +134,13 @@ In this example, you'll remove an HTTP health probe.
140134

141135
6. Select **Delete**.
142136

143-
:::image type="content" source="./media/manage-probes-how-to/remove-http-probe.png" alt-text="Screenshot of HTTP probe removal.":::
144-
145137
## HTTPS health probe
146138

147-
In this section, you'll learn how to add and remove an HTTPS health probe. A public load balancer is used in the examples.
139+
In this section, you learn how to add and remove an HTTPS health probe. A public load balancer is used in the examples.
148140

149141
### Add an HTTPS health probe
150142

151-
In this example, you'll create an HTTPS health probe.
143+
In this example, you create an HTTPS health probe.
152144

153145
1. Sign in to the [Azure portal](https://portal.azure.com).
154146

@@ -160,8 +152,6 @@ In this example, you'll create an HTTPS health probe.
160152

161153
5. Select **+ Add** in **Health probes** to add a probe.
162154

163-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
164-
165155
6. Enter or select the following information in **Add health probe**.
166156

167157
| Setting | Value |
@@ -176,7 +166,7 @@ In this example, you'll create an HTTPS health probe.
176166

177167
### Remove an HTTPS health probe
178168

179-
In this example, you'll remove an HTTPS health probe.
169+
In this example, you remove an HTTPS health probe.
180170

181171
1. Sign in to the [Azure portal](https://portal.azure.com).
182172

@@ -190,8 +180,6 @@ In this example, you'll remove an HTTPS health probe.
190180

191181
6. Select **Delete**.
192182

193-
:::image type="content" source="./media/manage-probes-how-to/remove-https-probe.png" alt-text="Screenshot of HTTPS probe removal.":::
194-
195183
## Next steps
196184

197185
In this article, you learned how to manage health probes for an Azure Load Balancer.

0 commit comments

Comments
 (0)