Skip to content

Commit 58294aa

Browse files
Merge pull request #287594 from mbender-ms/lb-ado319516-frsh
load balancer - freshness - September 2024
2 parents f813e1f + 3cfde1a commit 58294aa

9 files changed

+30
-28
lines changed

articles/load-balancer/create-custom-http-health-probe-howto.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: mbender-ms
77
ms.service: azure-load-balancer
88
ms.custom: devx-track-python
99
ms.topic: troubleshooting
10-
ms.date: 05/22/2023
10+
ms.date: 09/30/2024
1111
ms.author: mbender
1212
---
1313

articles/load-balancer/gateway-deploy-dual-stack-load-balancer.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: In this tutorial, you deploy IPv6 configurations to an existing IPv
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: how-to
8-
ms.date: 09/25/2023
8+
ms.date: 09/25/2024
99
ms.author: mbender
1010
ms.custom: template-how-to, devx-track-azurecli, devx-track-azurepowershell
1111
---
@@ -38,29 +38,29 @@ Along with the Gateway Load Balancer, this scenario includes the following alrea
3838

3939
## Add IPv6 address ranges to an existing subnet
4040

41-
This article assumes you already have a Gateway Load Balancer configured for IPv4 traffic, with a corresponding VNET and subnet. In this step, you add IPv6 ranges to your Gateway Load Balancer's VNET and subnet. This range is need when creating an IPv6 frontend configuration for your Gateway Load Balancer using a private IP address from this subnet/VNET.
41+
This article assumes you already have a Gateway Load Balancer configured for IPv4 traffic, with a corresponding virtual network and subnet. In this step, you add IPv6 ranges to your Gateway Load Balancer's virtual network and subnet. This range is need when creating an IPv6 frontend configuration for your Gateway Load Balancer using a private IP address from this subnet/virtual network.
4242
# [PowerShell](#tab/powershell)
4343

4444
```powershell-interactive
4545
46-
#Add IPv6 ranges to the VNET and subnet
47-
#Retrieve the VNET object
46+
#Add IPv6 ranges to the virtual network and subnet
47+
#Retrieve the virtual network object
4848
$rg = Get-AzResourceGroup -ResourceGroupName "myResourceGroup"
4949
$vnet = Get-AzVirtualNetwork -ResourceGroupName $rg.ResourceGroupName -Name "myVNet"
5050
51-
#Add IPv6 prefix to the VNET
51+
#Add IPv6 prefix to the virtual network
5252
$vnet.addressspace.addressprefixes.add("fd00:db8:deca::/48")
5353
54-
#Update the running VNET
54+
#Update the running virtual network
5555
$vnet | Set-AzVirtualNetwork
5656
57-
#Retrieve the subnet object from the local copy of the VNET
57+
#Retrieve the subnet object from the local copy of the virtual network
5858
$subnet= $vnet.subnets[0]
5959
6060
#Add IPv6 prefix to the subnet
6161
$subnet.addressprefix.add("fd00:db8:deca::/64")
6262
63-
#Update the running VNET with the new subnet configuration
63+
#Update the running virtual network with the new subnet configuration
6464
$vnet | Set-AzVirtualNetwork
6565
6666
```
@@ -79,7 +79,7 @@ az network vnet subnet update
7979

8080
## Add an IPv6 frontend to gateway load balancer
8181

82-
Now that you've added IPv6 prefix ranges to your Gateway Load Balancer's subnet and VNET, we can create a new IPv6 frontend configuration on the Gateway Load Balancer, with an IPv6 address from your subnet's range.
82+
Now that you've added IPv6 prefix ranges to your Gateway Load Balancer's subnet and virtual network, we can create a new IPv6 frontend configuration on the Gateway Load Balancer, with an IPv6 address from your subnet's range.
8383

8484
# [PowerShell](#tab/powershell)
8585

articles/load-balancer/ipv6-add-to-existing-vnet-cli.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article shows how to deploy IPv6 addresses to an existing appl
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: how-to
8-
ms.date: 09/27/2023
8+
ms.date: 09/30/2024
99
ms.author: mbender
1010
ms.custom: devx-track-azurecli, template-how-to
1111
ms.devlang: azurecli
@@ -130,9 +130,9 @@ az network nic ip-config create \
130130
--lb-name myLoadBalancer
131131
```
132132

133-
## View IPv6 dual stack virtual network in Azure portal
133+
## View IPv6 dual-stack virtual network in Azure portal
134134

135-
You can view the IPv6 dual stack virtual network in Azure portal as follows:
135+
You can view the IPv6 dual-stack virtual network in Azure portal as follows:
136136
1. In the portal's search bar, enter **virtual networks** and
137137
1. In the **Virtual Networks** window, select **myVNet**.
138138
1. Select **Connected devices** under **Settings** to view the attached network interfaces. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations.

articles/load-balancer/ipv6-add-to-existing-vnet-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: mbender-ms
77
manager: kumudd
88
ms.service: azure-virtual-network
99
ms.topic: how-to
10-
ms.date: 09/27/2023
10+
ms.date: 09/30/2024
1111
ms.author: mbender
1212
ms.custom: devx-track-azurepowershell, template-how-to
1313
ROBOTS: NOINDEX
@@ -147,9 +147,9 @@ $NIC_3 | Add-AzNetworkInterfaceIpConfig -Name MyIPv6Config -Subnet $vnet.Subnets
147147
$NIC_3 | Set-AzNetworkInterface
148148
```
149149

150-
## View IPv6 dual stack virtual network in Azure portal
150+
## View IPv6 dual-stack virtual network in Azure portal
151151

152-
You can view the IPv6 dual stack virtual network in Azure portal as follows:
152+
You can view the IPv6 dual-stack virtual network in Azure portal as follows:
153153
1. In the portal's search bar, enter **virtual networks** and
154154
1. In the **Virtual Networks** window, select **myVNet**.
155155
1. Select **Connected devices** under **Settings** to view the attached network interfaces. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations.

articles/load-balancer/load-balancer-basic-upgrade-guidance.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.service: azure-load-balancer
66
ms.author: mbender
77
ms.topic: conceptual
8-
ms.date: 09/27/2023
8+
ms.date: 09/30/2024
99
ms.custom: template-concept
1010
# Customer intent: As an cloud engineer with Basic Load Balancer services, I need guidance and direction on migrating my workloads off Basic to Standard SKUs
1111
---
@@ -67,7 +67,7 @@ Use these PowerShell scripts to help with upgrading from Basic to Standard SKU:
6767
6868
When manually migrating from a Basic to Standard SKU Load Balancer, there are a couple key considerations to keep in mind:
6969

70-
- It is not possible to mix Basic and Standard SKU IPs or Load Balancers. All Public IPs associated with a Load Balancer and its backend pool members must match.
70+
- It isn't possible to mix Basic and Standard SKU IPs or Load Balancers. All Public IPs associated with a Load Balancer and its backend pool members must match.
7171
- Public IP allocation method must be set to 'static' when a Public IP is disassociated from a Load Balancer or Virtual Machine, or the allocated IP will be lost.
7272
- Standard SKU public IP addresses are secure by default, requiring that a Network Security Group explicitly allow traffic to any public IPs
7373
- Standard SKU Load Balancers block outbound access by default. To enable outbound access, a public load balancer needs an outbound rule for backend members. For private load balancers, either configure a NAT Gateway on the backend pool members' subnet or add instance-level public IP addresses to each backend member.
@@ -85,7 +85,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
8585
1. Health probes
8686
1. Load balancing rules - use the temporary frontend configuration
8787
1. NAT rules - use the temporary frontend configuration
88-
1. For public load balancers, if you do not have one already, [create a new Network Security Group](../virtual-network/tutorial-filter-network-traffic.md) with allow rules for the traffic coming through the Load Balancer rules
88+
1. For public load balancers, if you don't have one already, [create a new Network Security Group](../virtual-network/tutorial-filter-network-traffic.md) with allow rules for the traffic coming through the Load Balancer rules
8989
1. For Virtual Machine Scale Set backends, remove the Load Balancer association in the Networking settings and [update the instances](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
9090
1. Delete the Basic Load Balancer
9191
> [!NOTE]
@@ -100,7 +100,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
100100
## FAQ
101101

102102
### Will the Basic Load Balancer retirement impact Cloud Services Extended Support (CSES) deployments?
103-
No, this retirement will not impact your existing or new deployments on CSES. This means that you can still create and use Basic Load Balancers for CSES deployments. However, we advise using Standard SKU on ARM native resources (those that do not depend on CSES) when possible, because Standard has more advantages than Basic.
103+
No, this retirement won't impact your existing or new deployments on CSES. This means that you can still create and use Basic Load Balancers for CSES deployments. However, we advise using Standard SKU on Azure Resource Manager (ARM) native resources (those that don't depend on CSES) when possible, because Standard has more advantages than Basic.
104104

105105
## Next Steps
106106

articles/load-balancer/quickstart-load-balancer-standard-internal-bicep.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: quickstart
88
ms.author: mbender
9-
ms.date: 07/22/2024
9+
ms.date: 09/30/2024
1010
ms.custom: template-quickstart, subject-armqs, mode-arm, devx-track-bicep,engagement-fy23
1111
---
1212

articles/load-balancer/quickstart-load-balancer-standard-internal-cli.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This quickstart shows how to create an internal load balancer using
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: quickstart
8-
ms.date: 05/01/2023
8+
ms.date: 09/30/2024
99
ms.author: mbender
1010
ms.custom: mvc, devx-track-azurecli, mode-api, template-quickstart, engagement-fy23
1111
#Customer intent: I want to create a load balancer so that I can load balance internal traffic to VMs.
@@ -95,7 +95,9 @@ az network bastion create \
9595
--name myBastionHost \
9696
--public-ip-address myBastionIP \
9797
--vnet-name myVNet \
98-
--location westus2
98+
--location westus2 \
99+
--only-show-errors \
100+
--no-wait
99101
```
100102

101103
It can take a few minutes for the Azure Bastion host to deploy.

articles/load-balancer/quickstart-load-balancer-standard-public-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This quickstart shows how to create a public load balancer using th
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: quickstart
8-
ms.date: 09/25/2023
8+
ms.date: 09/30/2024
99
ms.author: mbender
1010
ms.custom: mvc, devx-track-azurecli, mode-api, template-quickstart, engagement-fy23
1111
#Customer intent: I want to create a load balancer so that I can load balance internet traffic to VMs.

articles/load-balancer/troubleshoot-outbound-connection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: load-balancer
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: troubleshooting
8-
ms.date: 08/24/2023
8+
ms.date: 09/30/2024
99
ms.author: mbender
1010
---
1111

1212
# Troubleshoot Azure Load Balancer outbound connectivity issues
1313

14-
Learn troubleshooting guidance for outbound connections in Azure Load Balancer. This includes understanding source network address translation (SNAT) and it's impact on connections, using individual public IPs on VMs, and designing applications for connection efficiency to avoid SNAT port exhaustion. Most problems with outbound connectivity that customers experience is due to SNAT port exhaustion and connection timeouts leading to dropped packets.
14+
Learn troubleshooting guidance for outbound connections in Azure Load Balancer. This includes understanding source network address translation (SNAT) and its impact on connections, using individual public IPs on VMs, and designing applications for connection efficiency to avoid SNAT port exhaustion. Most problems with outbound connectivity that customers experience is due to SNAT port exhaustion and connection timeouts leading to dropped packets.
1515

1616
To learn more about SNAT ports, see [Source Network Address Translation for outbound connections](load-balancer-outbound-connections.md).
1717

@@ -39,13 +39,13 @@ Azure NAT Gateway is a highly resilient and scalable Azure service that provides
3939

4040
A NAT gateway selects ports at random from the available pool of ports. If there aren't available ports, SNAT ports are reused as long as there's no existing connection to the same destination public IP and port. This port selection and reuse behavior of a NAT gateway makes it less likely to experience connection timeouts.
4141

42-
To learn more about how SNAT and port usage works for NAT gateway, see [SNAT fundamentals](../virtual-network/nat-gateway/nat-gateway-resource.md#fundamentals). There are a few conditions in which you won't be able to use NAT gateway for outbound connections. For more information on NAT gateway limitations, see [NAT Gateway limitations](../virtual-network/nat-gateway/nat-gateway-resource.md#limitations).
42+
To learn more about how SNAT and port usage works for NAT gateway, see [SNAT fundamentals](../virtual-network/nat-gateway/nat-gateway-resource.md#fundamentals). There are a few conditions where you can't use NAT gateway for outbound connections. For more information on NAT gateway limitations, see [NAT Gateway limitations](../virtual-network/nat-gateway/nat-gateway-resource.md#limitations).
4343

4444
If you're unable to use a NAT gateway for outbound connectivity, refer to the other migration options described in this article.
4545

4646
### Configure load balancer outbound rules to maximize SNAT ports per VM
4747

48-
If you’re using a public standard load balancer and experience SNAT exhaustion or connection failures, ensure you’re using outbound rules with manual port allocation. Otherwise, you’re likely relying on load balancer’s default port allocation. Default port allocation automatically assigns a conservative number of ports, which is based on the number of instances in your backend pool. Default port allocation isn't a recommended method for enabling outbound connections. When your backend pool scales, your connections may be impacted if ports need to be reallocated.
48+
If you’re using a public standard load balancer and experience SNAT exhaustion or connection failures, ensure you’re using outbound rules with manual port allocation. Otherwise, you’re likely relying on load balancer’s default port allocation. Default port allocation automatically assigns a conservative number of ports, which is based on the number of instances in your backend pool. Default port allocation isn't a recommended method for enabling outbound connections. When your backend pool scales, your connections can be impacted if ports need to be reallocated.
4949

5050
To learn more about default port allocation, see [Source Network Address Translation for outbound connections](load-balancer-outbound-connections.md).
5151

0 commit comments

Comments
 (0)