Skip to content

Commit 46c4941

Browse files
committed
Review Fixes
1 parent ecef306 commit 46c4941

File tree

3 files changed

+17
-16
lines changed

3 files changed

+17
-16
lines changed

articles/load-balancer/gateway-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Gateway Load Balancer has the following benefits:
4242

4343
## Configuration and supported scenarios
4444

45-
A Standard Public Load balancer or a Standard IP configuration of a virtual machine can be chained to a Gateway Load Balancer. "Chaining" refers to the load balancer frontend or NIC IP configuration containing a reference to a Gateway Load Balancer frontend IP configuration. Once the Gateway Load Balancer is chained to a consumer resource, no additional configuration such as UDRs are needed to ensure traffic to and from the application endpoint is sent to the Gateway Load Balancer.
45+
A Standard Public Load balancer or a Standard IP configuration of a virtual machine can be chained to a Gateway Load Balancer. "Chaining" refers to the load balancer frontend or NIC IP configuration containing a reference to a Gateway Load Balancer frontend IP configuration. Once the Gateway Load Balancer is chained to a consumer resource, no additional configuration such as UDRs is needed to ensure traffic to and from the application endpoint is sent to the Gateway Load Balancer.
4646

4747
Gateway Load Balancer supports both inbound and outbound traffic inspection. For inserting NVAs in the path of outbound traffic with Standard Load Balancer, Gateway Load Balancer must be chained to the frontend IP configurations selected in the configured outbound rules.
4848

articles/load-balancer/load-balancer-best-practices.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ The following best practices are recommended to ensure the reliability of your A
3636
#### Deploy with zone-redundancy
3737

3838
Zone-redundancy provides the best resiliency by protecting the data path from zone failure. The load balancer's availability zone selection is synonymous with its frontend IP's zone selection. For public load balancers, if the public IP in the load balancer's frontend is zone redundant then the load balancer is also zone-redundant.
39+
3940
- Deploy load balancer in a region that supports availability zones and enable Zone-redundant when creating a new Public IP address used for the Frontend IP configuration.
4041
- Public IP addresses can't be changed to zone redundant but we're updating all non-zonal Standard Public IPs to be zone redundant by default. For more information, visit the following Microsoft Azure Blog [Azure Public IPs are now zone-redundant by default | Microsoft Azure Blog](https://azure.microsoft.com/blog/azure-public-ips-are-now-zone-redundant-by-default/?msockid=028aa4446a5a601f37ecb0076b7761c7). To see the most updated list of regions that support zone redundant Standard Public IPs by default, see [Public IP addresses in Azure](../virtual-network/ip-services/public-ip-addresses.md)
4142
- If you can't deploy as zone-redundant, the next option is to have a zonal load balancer deployment.
@@ -44,7 +45,7 @@ Zone-redundancy provides the best resiliency by protecting the data path from zo
4445

4546
#### Redundancy in your backend pool
4647

47-
Ensure that the backend pool contains at least two instances. If your backend pool only has one instance and it's unhealthy, all traffic sent to the backend pool fails due to lack of redundancy. The Standard Load Balancer SLA is also only supported when there are at least 2 healthy backend pool instances per backend pool. Visit the [SLA documentation](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for more information.
48+
Ensure that the backend pool contains at least two instances. If your backend pool only has one instance and it's unhealthy, all traffic sent to the backend pool fails due to lack of redundancy. The Standard Load Balancer SLA is also only supported when there are at least two healthy backend pool instances per backend pool. Visit the [SLA documentation](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for more information.
4849

4950
#### Deploy a global load balancer
5051

@@ -66,7 +67,7 @@ We recommend using a Gateway load balancer in north-south traffic scenarios with
6667

6768
## Configuration guidance
6869

69-
The following configuration guidance are best practices for configuring your Azure Load Balancer deployments.
70+
The following configuration guidance is best practices for configuring your Azure Load Balancer deployments.
7071

7172
### Create Network Security Groups (NSGs)
7273

articles/load-balancer/tutorial-create-gateway-load-balancer.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: 'Tutorial: Create a gateway load balancer'
33
titleSuffix: Azure Load Balancer
4-
description: Use this tutorial to learn how to create a gateway load balancer using the Azure portal, Azure PowerShell, and Azure LCI.
4+
description: Use this tutorial to learn how to create a gateway load balancer using the Azure portal, Azure PowerShell, and Azure CLI.
55
author: mbender-ms
66
ms.author: mbender
77
ms.service: azure-load-balancer
@@ -83,7 +83,7 @@ Create a resource group with [az group create](/cli/azure/group#az-group-create)
8383

8484
A virtual network is needed for the resources that are in the backend pool of the gateway load balancer.
8585

86-
Use [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create) to create the virtual network.
86+
Use [az network virtual network create](/cli/azure/network/vnet#az-network-vnet-create) to create the virtual network.
8787

8888
```azurecli-interactive
8989
az network vnet create \
@@ -139,7 +139,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
139139
140140
## Create NSG
141141

142-
Use the following example to create a network security group. You'll configure the NSG rules needed for network traffic in the virtual network created previou
142+
Use the following example to create a network security group. You configure the NSG rules needed for network traffic in the virtual network created previous
143143

144144
Use [az network nsg create](/cli/azure/network/nsg#az-network-nsg-create) to create the NSG.
145145

@@ -256,7 +256,7 @@ New-AzBastion @bastion -AsJob
256256

257257
## Create NSG
258258

259-
Use the following example to create a network security group. You'll configure the NSG rules needed for network traffic in the virtual network created previously.
259+
Use the following example to create a network security group. You configure the NSG rules needed for network traffic in the virtual network created previously.
260260

261261
Use [New-AzNetworkSecurityRuleConfig](/powershell/module/az.network/new-aznetworksecurityruleconfig) to create rules for the NSG. Use [New-AzNetworkSecurityGroup](/powershell/module/az.network/new-aznetworksecuritygroup) to create the NSG.
262262

@@ -372,7 +372,7 @@ In this section, you create the configuration and deploy the gateway load balanc
372372
| IP Version | Select **IPv4** or **IPv6** depending on your requirements. |
373373
| Frontend IP address | Select **lb-frontend-IP**. |
374374
| Backend pool | Select **lb-backend-pool**. |
375-
| Health probe | Select **Create new**. </br> In **Name**, enter **lb-health-probe**. </br> Select **TCP** in **Protocol**. </br> Leave the rest of the defaults, and select **Save**. |
375+
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
376376
| Session persistence | Select **None**. |
377377
| Enable TCP reset | Leave default of unchecked. |
378378
| Enable floating IP | Leave default of unchecked. |
@@ -408,7 +408,7 @@ To create the load balancer, use [az network lb create](/cli/azure/network/lb#az
408408

409409
An internal interface is automatically created with Azure CLI with the **`--identifier`** of **900** and **`--port`** of **10800**.
410410

411-
You'll use [az network lb address-pool tunnel-interface add](/cli/azure/network/lb/address-pool/tunnel-interface#az-network-lb-address-pool-tunnel-interface-add) to create external tunnel interface for the load balancer.
411+
You use [az network lb address-pool tunnel-interface add](/cli/azure/network/lb/address-pool/tunnel-interface#az-network-lb-address-pool-tunnel-interface-add) to create external tunnel interface for the load balancer.
412412

413413
```azurecli-interactive
414414
az network lb address-pool tunnel-interface add \
@@ -457,9 +457,9 @@ Traffic destined for the backend instances is routed with a load-balancing rule.
457457

458458
# [Azure PowerShell](#tab/azurepowershell/)
459459

460-
In this section, you'll create the configuration and deploy the gateway load balancer. Use [New-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create the frontend IP configuration of the load balancer.
460+
In this section, you create the configuration and deploy the gateway load balancer. Use [New-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create the frontend IP configuration of the load balancer.
461461

462-
You'll use [New-AzLoadBalancerTunnelInterface](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create two tunnel interfaces for the load balancer.
462+
You use [New-AzLoadBalancerTunnelInterface](/powershell/module/az.network/new-azloadbalancerfrontendipconfig) to create two tunnel interfaces for the load balancer.
463463

464464
Create a backend pool with [New-AzLoadBalancerBackendAddressPoolConfig](/powershell/module/az.network/new-azloadbalancerbackendaddresspoolconfig) for the NVAs.
465465

@@ -561,7 +561,7 @@ Deploy NVAs through the Azure Marketplace. Once deployed, add the virtual machin
561561

562562
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
563563

564-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
564+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
565565

566566
Use [Set-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/set-azloadbalancerfrontendipconfig) to chain the gateway load balancer frontend to your existing load balancer.
567567

@@ -630,7 +630,7 @@ You add the frontend to the frontend IP of an existing load balancer in your sub
630630

631631
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
632632

633-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
633+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
634634

635635
Use [az network lb frontend-ip show](/cli/azure/network/lb/frontend-ip#az-az-network-lb-frontend-ip-show) to place the resource ID of your gateway load balancer frontend into a variable.
636636

@@ -657,7 +657,7 @@ Use [az network lb frontend-ip update](/cli/azure/network/lb/frontend-ip#az-netw
657657

658658
In this example, you'll chain the frontend of a standard load balancer to the gateway load balancer.
659659

660-
You'll add the frontend to the frontend IP of an existing load balancer in your subscription.
660+
You add the frontend to the frontend IP of an existing load balancer in your subscription.
661661

662662
Use [Set-AzLoadBalancerFrontendIpConfig](/powershell/module/az.network/set-azloadbalancerfrontendipconfig) to chain the gateway load balancer frontend to your existing load balancer.
663663

@@ -731,7 +731,7 @@ You add the gateway load balancer's frontend to an existing VM's NIC IP configur
731731

732732
Alternatively, you can chain a VM's NIC IP configuration to the gateway load balancer.
733733

734-
You'll add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
734+
You add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
735735

736736
Use [az network lb frontend-ip show](/cli/azure/network/lb/frontend-ip#az-az-network-lb-frontend-ip-show) to place the resource ID of your gateway load balancer frontend into a variable.
737737

@@ -757,7 +757,7 @@ Use [az network lb frontend-ip update](/cli/azure/network/nic/ip-config#az-netwo
757757

758758
Alternatively, you can chain a VM's NIC IP configuration to the gateway load balancer.
759759

760-
You'll add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
760+
You add the gateway load balancer's frontend to an existing VM's NIC IP configuration.
761761

762762
Use [Set-AzNetworkInterfaceIpConfig](/powershell/module/az.network/set-aznetworkinterfaceipconfig) to chain the gateway load balancer frontend to your existing VM's NIC IP configuration.
763763

0 commit comments

Comments
 (0)