Skip to content

Commit 31f5d99

Browse files
Tweak
1 parent ead557a commit 31f5d99

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

articles/load-balancer/load-balancer-custom-probe-overview.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,11 @@ If all probes for all instances in a backend pool fail, existing UDP flows will
180180

181181
All Load Balancer health probes originate from the IP address 168.63.129.16 as their source. When you bring your own IP addresses to Azure's Virtual Network, this health probe source IP address is guaranteed to be unique as it is globally reserved for Microsoft. This address is the same in all regions and does not change. It should not be considered a security risk because only the internal Azure platform can source a packet from this IP address.
182182

183+
In addition to Load Balancer health probes, the following operations use this IP address:
184+
185+
- Enables the VM Agent to communicating with the platform to signal it is in a “Ready” state
186+
- Enables communication with the DNS virtual server to provide filtered name resolution to customers that do not define custom DNS servers. This filtering ensures that customers can only resolve the hostnames of their deployment.
187+
183188
For Load Balancer's health probe to mark your instance up, you **must** allow this IP address in any Azure [Security Groups](../virtual-network/security-overview.md) and local firewall policies.
184189

185190
If you don't allow this IP address in your firewall policies, the health probe will fail as it is unable to reach your instance. In turn, Load Balancer will mark down your instance due to the health probe failure. This can cause your load balanced service to fail.

0 commit comments

Comments
 (0)