You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/gateway-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Gateway Load Balancer has the following benefits:
42
42
43
43
## Configuration and supported scenarios
44
44
45
-
A Standard Public Load balancer or a Standard IP configuration of a virtual machine can be chained to a Gateway Load Balancer. "Chaining" refers to the load balancer frontend or NIC IP configuration containing a reference to a Gateway Load Balancer frontend IP configuration. Once the Gateway Load Balancer is chained to a consumer resource, no additional configuration such as UDRs are needed to ensure traffic to and from the application endpoint is sent to the Gateway Load Balancer.
45
+
A Standard Public Load balancer or a Standard IP configuration of a virtual machine can be chained to a Gateway Load Balancer. "Chaining" refers to the load balancer frontend or NIC IP configuration containing a reference to a Gateway Load Balancer frontend IP configuration. Once the Gateway Load Balancer is chained to a consumer resource, no additional configuration such as UDRs is needed to ensure traffic to and from the application endpoint is sent to the Gateway Load Balancer.
46
46
47
47
Gateway Load Balancer supports both inbound and outbound traffic inspection. For inserting NVAs in the path of outbound traffic with Standard Load Balancer, Gateway Load Balancer must be chained to the frontend IP configurations selected in the configured outbound rules.
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-best-practices.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,7 @@ The following best practices are recommended to ensure the reliability of your A
36
36
#### Deploy with zone-redundancy
37
37
38
38
Zone-redundancy provides the best resiliency by protecting the data path from zone failure. The load balancer's availability zone selection is synonymous with its frontend IP's zone selection. For public load balancers, if the public IP in the load balancer's frontend is zone redundant then the load balancer is also zone-redundant.
39
+
39
40
- Deploy load balancer in a region that supports availability zones and enable Zone-redundant when creating a new Public IP address used for the Frontend IP configuration.
40
41
- Public IP addresses can't be changed to zone redundant but we're updating all non-zonal Standard Public IPs to be zone redundant by default. For more information, visit the following Microsoft Azure Blog [Azure Public IPs are now zone-redundant by default | Microsoft Azure Blog](https://azure.microsoft.com/blog/azure-public-ips-are-now-zone-redundant-by-default/?msockid=028aa4446a5a601f37ecb0076b7761c7). To see the most updated list of regions that support zone redundant Standard Public IPs by default, see [Public IP addresses in Azure](../virtual-network/ip-services/public-ip-addresses.md)
41
42
- If you can't deploy as zone-redundant, the next option is to have a zonal load balancer deployment.
@@ -44,7 +45,7 @@ Zone-redundancy provides the best resiliency by protecting the data path from zo
44
45
45
46
#### Redundancy in your backend pool
46
47
47
-
Ensure that the backend pool contains at least two instances. If your backend pool only has one instance and it's unhealthy, all traffic sent to the backend pool fails due to lack of redundancy. The Standard Load Balancer SLA is also only supported when there are at least 2 healthy backend pool instances per backend pool. Visit the [SLA documentation](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for more information.
48
+
Ensure that the backend pool contains at least two instances. If your backend pool only has one instance and it's unhealthy, all traffic sent to the backend pool fails due to lack of redundancy. The Standard Load Balancer SLA is also only supported when there are at least two healthy backend pool instances per backend pool. Visit the [SLA documentation](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for more information.
48
49
49
50
#### Deploy a global load balancer
50
51
@@ -66,7 +67,7 @@ We recommend using a Gateway load balancer in north-south traffic scenarios with
66
67
67
68
## Configuration guidance
68
69
69
-
The following configuration guidance are best practices for configuring your Azure Load Balancer deployments.
70
+
The following configuration guidance is best practices for configuring your Azure Load Balancer deployments.
Copy file name to clipboardExpand all lines: articles/load-balancer/tutorial-create-gateway-load-balancer.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: 'Tutorial: Create a gateway load balancer'
3
3
titleSuffix: Azure Load Balancer
4
-
description: Use this tutorial to learn how to create a gateway load balancer using the Azure portal, Azure PowerShell, and Azure LCI.
4
+
description: Use this tutorial to learn how to create a gateway load balancer using the Azure portal, Azure PowerShell, and Azure CLI.
5
5
author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-load-balancer
@@ -83,7 +83,7 @@ Create a resource group with [az group create](/cli/azure/group#az-group-create)
83
83
84
84
A virtual network is needed for the resources that are in the backend pool of the gateway load balancer.
85
85
86
-
Use [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create) to create the virtual network.
86
+
Use [az network virtual network create](/cli/azure/network/vnet#az-network-vnet-create) to create the virtual network.
87
87
88
88
```azurecli-interactive
89
89
az network vnet create \
@@ -139,7 +139,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
139
139
140
140
## Create NSG
141
141
142
-
Use the following example to create a network security group. You'll configure the NSG rules needed for network traffic in the virtual network created previou
142
+
Use the following example to create a network security group. You configure the NSG rules needed for network traffic in the virtual network created previous
143
143
144
144
Use [az network nsg create](/cli/azure/network/nsg#az-network-nsg-create) to create the NSG.
145
145
@@ -256,7 +256,7 @@ New-AzBastion @bastion -AsJob
256
256
257
257
## Create NSG
258
258
259
-
Use the following example to create a network security group. You'll configure the NSG rules needed for network traffic in the virtual network created previously.
259
+
Use the following example to create a network security group. You configure the NSG rules needed for network traffic in the virtual network created previously.
260
260
261
261
Use [New-AzNetworkSecurityRuleConfig](/powershell/module/az.network/new-aznetworksecurityruleconfig) to create rules for the NSG. Use [New-AzNetworkSecurityGroup](/powershell/module/az.network/new-aznetworksecuritygroup) to create the NSG.
262
262
@@ -372,7 +372,7 @@ In this section, you create the configuration and deploy the gateway load balanc
372
372
| IP Version | Select **IPv4** or **IPv6** depending on your requirements. |
373
373
| Frontend IP address | Select **lb-frontend-IP**. |
374
374
| Backend pool | Select **lb-backend-pool**. |
375
-
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
375
+
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
376
376
| Session persistence | Select **None**. |
377
377
| Enable TCP reset | Leave default of unchecked. |
378
378
| Enable floating IP | Leave default of unchecked. |
@@ -408,7 +408,7 @@ To create the load balancer, use [az network lb create](/cli/azure/network/lb#az
408
408
409
409
An internal interface is automatically created with Azure CLI with the **`--identifier`** of **900** and **`--port`** of **10800**.
410
410
411
-
You'll use [az network lb address-pool tunnel-interface add](/cli/azure/network/lb/address-pool/tunnel-interface#az-network-lb-address-pool-tunnel-interface-add) to create external tunnel interface for the load balancer.
411
+
You use [az network lb address-pool tunnel-interface add](/cli/azure/network/lb/address-pool/tunnel-interface#az-network-lb-address-pool-tunnel-interface-add) to create external tunnel interface for the load balancer.
412
412
413
413
```azurecli-interactive
414
414
az network lb address-pool tunnel-interface add \
@@ -457,9 +457,9 @@ Traffic destined for the backend instances is routed with a load-balancing rule.
457
457
458
458
# [Azure PowerShell](#tab/azurepowershell/)
459
459
460
-
In this section, you'll create the configuration and deploy the gateway load balancer. Use [New-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create the frontend IP configuration of the load balancer.
460
+
In this section, you create the configuration and deploy the gateway load balancer. Use [New-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create the frontend IP configuration of the load balancer.
461
461
462
-
You'll use [New-AzLoadBalancerTunnelInterface](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create two tunnel interfaces for the load balancer.
462
+
You use [New-AzLoadBalancerTunnelInterface](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create two tunnel interfaces for the load balancer.
463
463
464
464
Create a backend pool with [New-AzLoadBalancerBackendAddressPoolConfig](/powershell/module/az.network/new-azloadbalancerbackendaddresspoolconfig) for the NVAs.
465
465
@@ -561,7 +561,7 @@ Deploy NVAs through the Azure Marketplace. Once deployed, add the virtual machin
561
561
562
562
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
563
563
564
-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
564
+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
565
565
566
566
Use [Set-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/set-azloadbalancerfrontendipconfig) to chain the gateway load balancer frontend to your existing load balancer.
567
567
@@ -630,7 +630,7 @@ You add the frontend to the frontend IP of an existing load balancer in your sub
630
630
631
631
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
632
632
633
-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
633
+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
634
634
635
635
Use [az network lb frontend-ip show](/cli/azure/network/lb/frontend-ip#az-az-network-lb-frontend-ip-show) to place the resource ID of your gateway load balancer frontend into a variable.
636
636
@@ -657,7 +657,7 @@ Use [az network lb frontend-ip update](/cli/azure/network/lb/frontend-ip#az-netw
657
657
658
658
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
659
659
660
-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
660
+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
661
661
662
662
Use [Set-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/set-azloadbalancerfrontendipconfig) to chain the gateway load balancer frontend to your existing load balancer.
663
663
@@ -731,7 +731,7 @@ You add the gateway load balancer's frontend to an existing VM's NIC IP configur
731
731
732
732
Alternatively, you can chain a VM's NIC IP configuration to the gateway load balancer.
733
733
734
-
You'll add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
734
+
You add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
735
735
736
736
Use [az network lb frontend-ip show](/cli/azure/network/lb/frontend-ip#az-az-network-lb-frontend-ip-show) to place the resource ID of your gateway load balancer frontend into a variable.
737
737
@@ -757,7 +757,7 @@ Use [az network lb frontend-ip update](/cli/azure/network/nic/ip-config#az-netwo
757
757
758
758
Alternatively, you can chain a VM's NIC IP configuration to the gateway load balancer.
759
759
760
-
You'll add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
760
+
You add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
761
761
762
762
Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to chain the gateway load balancer frontend to your existing VM's NIC IP configuration.
0 commit comments