You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -15,9 +15,9 @@ An inbound NAT rule is used to forward traffic from a load balancer frontend to
15
15
16
16
There are two types of inbound NAT rule:
17
17
18
-
*Inbound NAT rule V1 for VMs - Targets a single machine in the backend pool of the load balancer
18
+
-**Inbound NAT rule V1 for virtual machines**: Targets a single machine in the backend pool of the load balancer.
19
19
20
-
*Inbound NAT rule V2 for VMs and VMSS- Targets multiple virtual machines in the backend pool of the load balancer
20
+
-**Inbound NAT rule V2 for virtual machines and virtual machine scale sets**: Targets multiple virtual machines in the backend pool of the load balancer.
21
21
22
22
In this article, you learn how to add and remove an inbound NAT rule for both types. You learn how to change the frontend port allocation in a multiple instance inbound NAT rule. You can choose from the Azure portal, PowerShell, or CLI examples.
23
23
@@ -30,7 +30,7 @@ In this article, you learn how to add and remove an inbound NAT rule for both ty
Choose this option to configure a rule for a single VM. Select Azure portal, PowerShell, or CLI for instructions.
36
36
@@ -48,8 +48,6 @@ In this example, you create an inbound NAT rule to forward port **500** to backe
48
48
49
49
5. Select **+ Add** in **Inbound NAT rules** to add the rule.
50
50
51
-
:::image type="content" source="./media/manage-inbound-nat-rules/add-rule.png" alt-text="Screenshot of the inbound NAT rules page for Azure Load Balancer":::
52
-
53
51
6. Enter or select the following information in **Add inbound NAT rule**.
54
52
55
53
| Setting | Value |
@@ -66,27 +64,23 @@ In this example, you create an inbound NAT rule to forward port **500** to backe
66
64
67
65
7. Leave the rest of the settings at the defaults and select **Add**.
68
66
69
-
:::image type="content" source="./media/manage-inbound-nat-rules/add-single-instance-rule.png" alt-text="Screenshot of the create inbound NAT rule page":::
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
69
+
In this example, you create an inbound NAT rule to forward port **500** to backend port **443**.
74
70
75
-
Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
71
+
-Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
76
72
77
-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
73
+
- Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
74
+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
78
75
79
-
Use [Get-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/get-azloadbalancerinboundnatruleconfig) to place the newly created inbound NAT rule information into a variable.
76
+
-Use [Get-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/get-azloadbalancerinboundnatruleconfig) to place the newly created inbound NAT rule information into a variable.
80
77
81
-
Use [Get-AzNetworkInterface](/powershell/module/az.network/get-aznetworkinterface) to place the network interface information into a variable.
78
+
-Use [Get-AzNetworkInterface](/powershell/module/az.network/get-aznetworkinterface) to place the network interface information into a variable.
82
79
83
-
Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to add the newly created inbound NAT rule to the IP configuration of the network interface.
80
+
-Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to add the newly created inbound NAT rule to the IP configuration of the network interface.
84
81
85
82
To save the configuration to the network interface, use [Set-AzNetworkInterface](/powershell/module/az.network/set-aznetworkinterface).
86
83
87
-
88
-
89
-
90
84
```azurepowershell
91
85
## Place the load balancer information into a variable for later use. ##
92
86
$slb = @{
@@ -140,9 +134,9 @@ $NIC | Set-AzNetworkInterface
140
134
141
135
In this example, you will create an inbound NAT rule to forward port **500** to backend port **443**. You will then attach the inbound NAT rule to a VM's NIC
142
136
143
-
Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
137
+
-Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
144
138
145
-
Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-config/inbound-nat-rule) to add the inbound NAT rule to a VM's NIC
139
+
-Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-config/inbound-nat-rule) to add the inbound NAT rule to a VM's NIC
146
140
147
141
148
142
```azurecli
@@ -165,7 +159,7 @@ Use [az network nic ip-config inbound-nat-rule add](/cli/azure/network/nic/ip-co
165
159
```
166
160
---
167
161
168
-
## Inbound NAT rule V2 for VM and VMSS
162
+
## Inbound NAT rule V2 for virtual machines and virtual machine scale sets
169
163
Choose this option to configure a rule with a range of ports to a backend pool of virtual machines. Select Azure portal, PowerShell, or CLI for instructions.
170
164
171
165
# [**Portal**](#tab/inbound-nat-rule-portal)
@@ -182,8 +176,6 @@ In this example, you create an inbound NAT rule to forward a range of ports star
182
176
183
177
5. Select **+ Add** in **Inbound NAT rules** to add the rule.
184
178
185
-
:::image type="content" source="./media/manage-inbound-nat-rules/add-rule.png" alt-text="Screenshot of the inbound NAT rules page for Azure Load Balancer":::
186
-
187
179
6. Enter or select the following information in **Add inbound NAT rule**.
188
180
189
181
| Setting | Value |
@@ -198,18 +190,15 @@ In this example, you create an inbound NAT rule to forward a range of ports star
198
190
| Protocol | Select **TCP**. |
199
191
200
192
7. Leave the rest at the defaults and select **Add**.
201
-
202
-
:::image type="content" source="./media/manage-inbound-nat-rules/add-inbound-nat-rule.png" alt-text="Screenshot of the add inbound NAT rules page":::
In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter `-FrontendPortRangeEnd` with a value of **1000**. This setting limits the backend pool to **500** virtual machines.
207
197
208
-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
209
-
210
-
Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
198
+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
211
199
212
-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer)
200
+
- Use [Add-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/add-azloadbalancerinboundnatruleconfig) to create the inbound NAT rule.
201
+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer)
213
202
214
203
```azurepowershell
215
204
## Place the load balancer information into a variable for later use. ##
@@ -239,7 +228,7 @@ $lb | Set-AzLoadBalancer
239
228
240
229
In this example, you create an inbound NAT rule to forward a range of ports starting at port 500 to backend port 443. The maximum number of machines in the backend pool is set by the parameter `--frontend-port-range-end` with a value of **1000**. This setting limits the backend pool to **500** virtual machines.
241
230
242
-
Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
231
+
-Use [az network lb inbound-nat-rule create](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-create) to create the NAT rule.
243
232
244
233
```azurecli
245
234
az network lb inbound-nat-rule create \
@@ -273,21 +262,17 @@ To accommodate more virtual machines in the backend pool in a multiple instance
273
262
274
263
5. Select the inbound NAT rule you wish to change. In this example, it's **myInboundNATrule**.
275
264
276
-
:::image type="content" source="./media/manage-inbound-nat-rules/select-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule overview.":::
277
-
278
265
6. In the properties of the inbound NAT rule, change the value in **Maximum number of machines in backend pool** to **1000**.
279
266
280
267
7. Select **Save**.
281
268
282
-
:::image type="content" source="./media/manage-inbound-nat-rules/change-frontend-ports.png" alt-text="Screenshot of inbound NAT rule properties page.":::
To accommodate more virtual machines in the backend pool in a multiple instance rule, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter `-FrontendPortRangeEnd` to **1500**. This setting increases the maximum number of machines in the backend pool to **1000**.
287
272
288
-
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
273
+
-Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
289
274
290
-
To change the port allocation, use [Set-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/set-azloadbalancerinboundnatruleconfig).
275
+
-To change the port allocation, use [Set-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/set-azloadbalancerinboundnatruleconfig).
291
276
292
277
```azurepowershell
293
278
## Place the load balancer information into a variable for later use. ##
To accommodate more virtual machines in the backend pool, change the frontend port allocation in the inbound NAT rule. In this example, you change the parameter `--frontend-port-range-end` to **1500**. This setting increases the maximum number of machines in the backend pool to **1000**
317
302
318
-
Use [az network lb inbound-nat-rule update](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-update) to change the frontend port allocation.
303
+
-Use [az network lb inbound-nat-rule update](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-update) to change the frontend port allocation.
319
304
320
305
```azurecli
321
306
az network lb inbound-nat-rule update \
@@ -342,12 +327,8 @@ Port mappings for the virtual machines in the backend pool can be viewed by usin
342
327
343
328
5. Select **myInboundNATrule** or your inbound NAT rule.
344
329
345
-
:::image type="content" source="./media/manage-inbound-nat-rules/view-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule page.":::
346
-
347
330
6. Scroll to the **Port mapping** section of the inbound NAT rule properties page.
348
331
349
-
:::image type="content" source="./media/manage-inbound-nat-rules/view-port-mappings.png" alt-text="Screenshot of inbound NAT rule port mappings.":::
350
-
351
332
## Remove an inbound NAT rule
352
333
353
334
# [**Portal**](#tab/inbound-nat-rule-portal)
@@ -366,17 +347,13 @@ In this example, you remove an inbound NAT rule.
366
347
367
348
6. Select **Delete**.
368
349
369
-
:::image type="content" source="./media/manage-inbound-nat-rules/remove-inbound-nat-rule.png" alt-text="Screenshot of inbound NAT rule removal.":::
Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
376
-
377
-
To remove the inbound NAT rule, use [Remove-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/remove-azloadbalancerinboundnatruleconfig).
378
-
379
-
To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
354
+
- Use [Get-AzLoadBalancer](/powershell/module/az.network/get-azloadbalancer) to place the load balancer information into a variable.
355
+
- To remove the inbound NAT rule, use [Remove-AzLoadBalancerInboundNatRuleConfig](/powershell/module/az.network/remove-azloadbalancerinboundnatruleconfig).
356
+
- To save the configuration to the load balancer, use [Set-AzLoadBalancer](/powershell/module/az.network/set-azloadbalancer).
380
357
381
358
```azurepowershell
382
359
## Place the load balancer information into a variable for later use. ##
@@ -397,7 +374,7 @@ $lb | Set-AzLoadBalancer
397
374
398
375
In this example, you remove an inbound NAT rule.
399
376
400
-
Use [az network lb inbound-nat-rule delete](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-delete) to remove the rule.
377
+
-Use [az network lb inbound-nat-rule delete](/cli/azure/network/lb/inbound-nat-rule#az-network-lb-inbound-nat-rule-delete) to remove the rule.
Copy file name to clipboardExpand all lines: articles/load-balancer/manage-probes-how-to.md
+13-25Lines changed: 13 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-load-balancer
7
7
ms.topic: how-to
8
-
ms.date: 06/26/2024
8
+
ms.date: 12/06/2024
9
9
ms.custom: template-how-to
10
10
---
11
11
12
12
# Manage health probes for Azure Load Balancer using the Azure portal
13
13
14
-
Azure Load Balancer uses health probes to monitor the health of backend instances. In this article, you'll learn how to manage health probes for Azure Load Balancer.
14
+
Azure Load Balancer uses health probes to monitor the health of backend instances. In this article, you learn how to manage health probes for Azure Load Balancer.
15
15
16
16
There are three types of health probes:
17
17
@@ -25,11 +25,11 @@ Health probes have the following properties:
25
25
| Health Probe configuration | Details |
26
26
| --- | --- |
27
27
| Name | Name of the health probe. This is a name you get to define for your health probe |
28
-
| Protocol | Protocol of health probe. This is the protocol type you would like the health probe to leverage. Available options are: TCP, HTTP, HTTPS |
28
+
| Protocol | Protocol of health probe. This is the protocol type you would like the health probe to use. Available options are: TCP, HTTP, HTTPS |
29
29
| Port | Port of the health probe. The destination port you would like the health probe to use when it connects to the virtual machine to check the virtual machine's health status. You must ensure that the virtual machine is also listening on this port (that is, the port is open). |
30
30
| Interval (seconds) | Interval of health probe. The amount of time (in seconds) between consecutive health check attempts to the virtual machine |
31
31
| Used by | The list of load balancer rules using this specific health probe. You should have at least one rule using the health probe for it to be effective |
32
-
| Path | The URI used for requesting health status from the virtual machine instance by the health probe (only applicable for HTTP(s) probes).
32
+
| Path | The URI used for requesting health status from the virtual machine instance by the health probe (only applicable for HTTPs probes).
33
33
34
34
>[!IMPORTANT]
35
35
>Load Balancer health probes originate from the IP address 168.63.129.16 and must not be blocked for probes to mark your instance as up. To see this probe traffic within your backend instance, review [the Azure Load Balancer FAQ](./load-balancer-faqs.yml).
@@ -45,11 +45,11 @@ Health probes have the following properties:
45
45
46
46
## TCP health probe
47
47
48
-
In this section, you'll learn how to add and remove a TCP health probe. A public load balancer is used in the examples.
48
+
In this section, you learn how to add and remove a TCP health probe. A public load balancer is used in the examples.
49
49
50
50
### Add a TCP health probe
51
51
52
-
In this example, you'll create a TCP health probe to monitor port 80.
52
+
In this example, you create a TCP health probe to monitor port 80.
53
53
54
54
1. Sign in to the [Azure portal](https://portal.azure.com).
55
55
@@ -61,8 +61,6 @@ In this example, you'll create a TCP health probe to monitor port 80.
61
61
62
62
5. Select **+ Add** in **Health probes** to add a probe.
63
63
64
-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
65
-
66
64
6. Enter or select the following information in **Add health probe**.
67
65
68
66
| Setting | Value |
@@ -76,7 +74,7 @@ In this example, you'll create a TCP health probe to monitor port 80.
76
74
77
75
### Remove a TCP health probe
78
76
79
-
In this example, you'll remove a TCP health probe.
77
+
In this example, you remove a TCP health probe.
80
78
81
79
1. Sign in to the [Azure portal](https://portal.azure.com).
82
80
@@ -90,15 +88,13 @@ In this example, you'll remove a TCP health probe.
90
88
91
89
6. Select **Delete**.
92
90
93
-
:::image type="content" source="./media/manage-probes-how-to/remove-tcp-probe.png" alt-text="Screenshot of TCP probe removal.":::
94
-
95
91
## HTTP health probe
96
92
97
-
In this section, you'll learn how to add and remove an HTTP health probe. A public load balancer is used in the examples.
93
+
In this section, you learn how to add and remove an HTTP health probe. A public load balancer is used in the examples.
98
94
99
95
### Add an HTTP health probe
100
96
101
-
In this example, you'll create an HTTP health probe.
97
+
In this example, you create an HTTP health probe.
102
98
103
99
1. Sign in to the [Azure portal](https://portal.azure.com).
104
100
@@ -110,8 +106,6 @@ In this example, you'll create an HTTP health probe.
110
106
111
107
5. Select **+ Add** in **Health probes** to add a probe.
112
108
113
-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
114
-
115
109
6. Enter or select the following information in **Add health probe**.
116
110
117
111
| Setting | Value |
@@ -126,7 +120,7 @@ In this example, you'll create an HTTP health probe.
126
120
127
121
### Remove an HTTP health probe
128
122
129
-
In this example, you'll remove an HTTP health probe.
123
+
In this example, you remove an HTTP health probe.
130
124
131
125
1. Sign in to the [Azure portal](https://portal.azure.com).
132
126
@@ -140,15 +134,13 @@ In this example, you'll remove an HTTP health probe.
140
134
141
135
6. Select **Delete**.
142
136
143
-
:::image type="content" source="./media/manage-probes-how-to/remove-http-probe.png" alt-text="Screenshot of HTTP probe removal.":::
144
-
145
137
## HTTPS health probe
146
138
147
-
In this section, you'll learn how to add and remove an HTTPS health probe. A public load balancer is used in the examples.
139
+
In this section, you learn how to add and remove an HTTPS health probe. A public load balancer is used in the examples.
148
140
149
141
### Add an HTTPS health probe
150
142
151
-
In this example, you'll create an HTTPS health probe.
143
+
In this example, you create an HTTPS health probe.
152
144
153
145
1. Sign in to the [Azure portal](https://portal.azure.com).
154
146
@@ -160,8 +152,6 @@ In this example, you'll create an HTTPS health probe.
160
152
161
153
5. Select **+ Add** in **Health probes** to add a probe.
162
154
163
-
:::image type="content" source="./media/manage-probes-how-to/add-probe.png" alt-text="Screenshot of the health probes page for Azure Load Balancer":::
164
-
165
155
6. Enter or select the following information in **Add health probe**.
166
156
167
157
| Setting | Value |
@@ -176,7 +166,7 @@ In this example, you'll create an HTTPS health probe.
176
166
177
167
### Remove an HTTPS health probe
178
168
179
-
In this example, you'll remove an HTTPS health probe.
169
+
In this example, you remove an HTTPS health probe.
180
170
181
171
1. Sign in to the [Azure portal](https://portal.azure.com).
182
172
@@ -190,8 +180,6 @@ In this example, you'll remove an HTTPS health probe.
190
180
191
181
6. Select **Delete**.
192
182
193
-
:::image type="content" source="./media/manage-probes-how-to/remove-https-probe.png" alt-text="Screenshot of HTTPS probe removal.":::
194
-
195
183
## Next steps
196
184
197
185
In this article, you learned how to manage health probes for an Azure Load Balancer.
0 commit comments