You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/ipv6-add-to-existing-vnet-cli.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: Add IPv6 to an IPv4 application in Azure virtual network - Azure CLI
3
3
titlesuffix: Azure Virtual Network
4
4
description: This article shows how to deploy IPv6 addresses to an existing application in Azure virtual network using Azure CLI.
5
5
services: virtual-network
6
-
author: asudbring
6
+
author: mbender-ms
7
7
ms.service: virtual-network
8
8
ms.topic: how-to
9
-
ms.workload: infrastructure-services
10
-
ms.date: 03/31/2020
11
-
ms.author: allensu
9
+
ms.date: 09/27/2023
10
+
ms.author: mbender
12
11
ms.custom: devx-track-azurecli, template-how-to
13
12
ms.devlang: azurecli
13
+
ROBOTS: NOINDEX
14
14
---
15
15
16
16
# Add IPv6 to an IPv4 application in Azure virtual network using Azure CLI
@@ -27,7 +27,7 @@ This article shows you how to add IPv6 addresses to an application that is using
27
27
28
28
## Create IPv6 addresses
29
29
30
-
Create public IPv6 address with with [az network public-ip create](/cli/azure/network/public-ip) for your Standard Load Balancer. The following example creates an IPv6 public IP address named *PublicIP_v6* in the *myResourceGroupSLB* resource group:
30
+
Create public IPv6 address with [az network public-ip create](/cli/azure/network/public-ip) for your Standard Load Balancer. The following example creates an IPv6 public IP address named *PublicIP_v6* in the *myResourceGroupSLB* resource group:
31
31
32
32
```azurecli-interactive
33
33
az network public-ip create \
@@ -134,18 +134,19 @@ az network nic ip-config create \
134
134
## View IPv6 dual stack virtual network in Azure portal
135
135
136
136
You can view the IPv6 dual stack virtual network in Azure portal as follows:
137
-
1. In the portal's search bar, enter *myVnet*.
138
-
2. When **myVnet** appears in the search results, select it. This launches the **Overview** page of the dual stack virtual network named *myVNet*. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations located in the dual stack subnet named *mySubnet*.
137
+
1. In the portal's search bar, enter **virtual networks** and
138
+
1. In the **Virtual Networks** window, select **myVNet**.
139
+
1. Select **Connected devices** under **Settings** to view the attached network interfaces. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations.
139
140
140
-

141
+
:::image type="content" source="media/ipv6-add-to-existing-vnet-powershell/ipv6-dual-stack-addresses.png" alt-text="Screenshot of connected devices settings displaying IPv4 and IPv6 addresses on network interfaces.":::
141
142
142
143
143
144
## Clean up resources
144
145
145
-
When no longer needed, you can use the [Remove-AzResourceGroup](/powershell/module/az.resources/remove-azresourcegroup) command to remove the resource group, VM, and all related resources.
146
+
When no longer needed, you can use the [az group delete](/cli/azure/group#az-group-delete) command to remove the resource group, VM, and all related resources.
If you choose to install and use PowerShell locally, this article requires the Azure PowerShell module version 6.9.0 or later. Run `Get-Module -ListAvailable Az` to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
26
+
If you choose to install and use PowerShell locally, this article requires the Azure PowerShell module version 6.9.0 or later. Run `Get-Module -ListAvailable Az` to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
## View IPv6 dual stack virtual network in Azure portal
151
151
152
152
You can view the IPv6 dual stack virtual network in Azure portal as follows:
153
-
1. In the portal's search bar, enter *myVnet*.
154
-
2. When **myVnet** appears in the search results, select it. This launches the **Overview** page of the dual stack virtual network named *myVNet*. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations located in the dual stack subnet named *mySubnet*.
153
+
1. In the portal's search bar, enter **virtual networks** and
154
+
1. In the **Virtual Networks** window, select **myVNet**.
155
+
1. Select **Connected devices** under **Settings** to view the attached network interfaces. The dual stack virtual network shows the three NICs with both IPv4 and IPv6 configurations.
155
156
156
-

157
+
:::image type="content" source="media/ipv6-add-to-existing-vnet-powershell/ipv6-dual-stack-addresses.png" alt-text="Screenshot of connected devices settings displaying IPv4 and IPv6 addresses on network interfaces.":::
Copy file name to clipboardExpand all lines: articles/load-balancer/ipv6-configure-standard-load-balancer-template-json.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,15 @@ title: Deploy an IPv6 dual stack application in Azure virtual network - Resource
3
3
titlesuffix: Azure Virtual Network
4
4
description: This article shows how to deploy an IPv6 dual stack application with Standard Load Balancer in Azure virtual network using Azure Resource Manager VM templates.
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-basic-upgrade-guidance.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.service: load-balancer
6
6
ms.author: mbender
7
7
ms.topic: conceptual
8
-
ms.date: 09/19/2022
8
+
ms.date: 09/27/2023
9
9
ms.custom: template-concept
10
10
#customer-intent: As an cloud engineer with basic Load Balancer services, I need guidance and direction on migrating my workloads off basic to standard SKUs
11
11
---
@@ -15,7 +15,7 @@ ms.custom: template-concept
15
15
>[!Important]
16
16
>On September 30, 2025, Basic Load Balancer will be retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer/). If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer prior to the retirement date. This article will help guide you through the upgrade process.
17
17
18
-
In this article, we'll discuss guidance for upgrading your Basic Load Balancer instances to Standard Load Balancer. Standard Load Balancer is recommended for all production instances and provides many [key differences](#basic-load-balancer-sku-vs-standard-load-balancer-sku) to your infrastructure.
18
+
In this article, we discuss guidance for upgrading your Basic Load Balancer instances to Standard Load Balancer. Standard Load Balancer is recommended for all production instances and provides many [key differences](#basic-load-balancer-sku-vs-standard-load-balancer-sku) to your infrastructure.
19
19
20
20
## Steps to complete the upgrade
21
21
@@ -47,7 +47,7 @@ This section lists out some key differences between these two Load Balancer SKUs
47
47
|**[Multiple front ends](load-balancer-multivip-overview.md)**| Inbound and [outbound](load-balancer-outbound-connections.md)| Inbound only |
48
48
|**Management Operations**| Most operations < 30 seconds | Most operations 60-90+ seconds |
49
49
|**SLA**|[99.99%](https://azure.microsoft.com/support/legal/sla/load-balancer/v1_0/)| Not available |
50
-
|**Global VNet Peering Support**| Standard ILB is supported via Global VNet Peering | Not supported |
50
+
|**Global Virtual Network Peering Support**| Standard ILB is supported via Global Virtual Network Peering | Not supported |
51
51
|**[NAT Gateway Support](../virtual-network/nat-gateway/nat-overview.md)**| Both Standard ILB and Standard Public Load Balancer are supported via Nat Gateway | Not supported |
52
52
|**[Private Link Support](../private-link/private-link-overview.md)**| Standard ILB is supported via Private Link | Not supported |
53
53
|**[Global tier (Preview)](cross-region-overview.md)**| Standard Load Balancer supports the Global tier for Public LBs enabling cross-region load balancing | Not supported |
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-multivip-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Azure Load Balancer allows you to load balance services on multiple ports, multi
18
18
19
19
This article describes the fundamentals of load balancing across multiple IP addresses using the same port and protocol. If you only intend to expose services on one IP address, you can find simplified instructions for [public](./quickstart-load-balancer-standard-public-portal.md) or [internal](./quickstart-load-balancer-standard-internal-portal.md) load balancer configurations. Adding multiple frontends is incremental to a single frontend configuration. Using the concepts in this article, you can expand a simplified configuration at any time.
20
20
21
-
When you define an Azure Load Balancer, a frontend and a backend pool configuration are connected with a load balancing rule. The health probe referenced by the load balancing rule is used to determine the health of a VM on a certain port and protocol. Based on the health probe results, new flows are sent to VMs in the backend pool. The frontend is defined by a three-tuple comprised of an IP address (public or internal), a transport protocol (UDP or TCP), and a port number from the load balancing rule. The backend pool is a collection of Virtual Machine IP configurations (part of the NIC resource) which reference the Load Balancer backend pool.
21
+
When you define an Azure Load Balancer, a frontend and a backend pool configuration are connected with a load balancing rule. The health probe referenced by the load balancing rule is used to determine the health of a VM on a certain port and protocol. Based on the health probe results, new flows are sent to VMs in the backend pool. The frontend is defined using a three-tuple comprised of an IP address (public or internal), a transport protocol (UDP or TCP), and a port number from the load balancing rule. The backend pool is a collection of Virtual Machine IP configurations (part of the NIC resource) which reference the Load Balancer backend pool.
22
22
23
23
The following table contains some example frontend configurations:
24
24
@@ -36,10 +36,10 @@ Azure Load Balancer provides flexibility in defining the load balancing rules. A
36
36
1. The default rule with no backend port reuse.
37
37
2. The Floating IP rule where backend ports are reused.
38
38
39
-
Azure Load Balancer allows you to mix both rule types on the same load balancer configuration. The load balancer can use them simultaneously for a given VM, or any combination, if you abide by the constraints of the rule. The rule type you choose depends on the requirements of your application and the complexity of supporting that configuration. You should evaluate which rule types are best for your scenario. We'll explore these scenarios further by starting with the default behavior.
39
+
Azure Load Balancer allows you to mix both rule types on the same load balancer configuration. The load balancer can use them simultaneously for a given VM, or any combination, if you abide by the constraints of the rule. The rule type you choose depends on the requirements of your application and the complexity of supporting that configuration. You should evaluate which rule types are best for your scenario. We explore these scenarios further by starting with the default behavior.
40
40
41
41
## Rule type #1: No backend port reuse
42
-
:::image type="content" source="media/load-balancer-multivip-overview/load-balancer-multivip.png" alt-text="Diagram of Load Balancer traffice with no backend port reuse.":::
42
+
:::image type="content" source="media/load-balancer-multivip-overview/load-balancer-multivip.png" alt-text="Diagram of Load Balancer traffic with no backend port reuse.":::
43
43
44
44
In this scenario, the frontends are configured as follows:
45
45
@@ -76,7 +76,7 @@ If you want to reuse the backend port across multiple rules, you must enable Flo
76
76
77
77
*Floating IP* is Azure's terminology for a portion of what is known as Direct Server Return (DSR). DSR consists of two parts: a flow topology and an IP address mapping scheme. At a platform level, Azure Load Balancer always operates in a DSR flow topology regardless of whether Floating IP is enabled or not. This means that the outbound part of a flow is always correctly rewritten to flow directly back to the origin.
78
78
79
-
With the default rule type, Azure exposes a traditional load balancing IP address mapping scheme for ease of use. Enabling Floating IP changes the IP address mapping scheme to allow for more flexibility as explained below.
79
+
With the default rule type, Azure exposes a traditional load balancing IP address mapping scheme for ease of use. Enabling Floating IP changes the IP address mapping scheme to allow for more flexibility.
80
80
81
81
:::image type="content" source="media/load-balancer-multivip-overview/load-balancer-multivip-dsr.png" alt-text="Diagram of load balancer traffic for multiple frontend IPs with floating IP.":::
0 commit comments