You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-best-practices.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,11 +25,11 @@ For each best practice, this article explains:
25
25
26
26
These best practices are based on a consensus opinion, and Azure platform capability and features sets, as they exist at the time this article was written.
27
27
28
-
## Architectural Best Practices
28
+
## Architectural best practices
29
29
30
30
The following architectural guidance helps ensure the reliability of your Azure Load Balancer deployment. It includes best practices for deploying with zone-redundancy, redundancy in your backend pool, and deploying a global load balancer. Along with reliability for Gateway Load Balancer, which is recommended when using NVAs instead of a dual load balancer set-up.
31
31
32
-
### Reliability Best Practices
32
+
### Reliability best practices
33
33
34
34
The following best practices are recommended to ensure the reliability of your Azure Load Balancer deployment.
35
35
@@ -64,7 +64,7 @@ Chaining your Gateway Load Balancer to a Standard Public Load Balancer is recomm
64
64
65
65
We recommend using a Gateway load balancer in north-south traffic scenarios with partner Network Virtual Appliances (NVAs). It's easier to deploy because Gateway load balancers don’t require extra configuration such as user-defined routes (UDRs) because it maintains flow stickiness and flow symmetry. It's also easier to manage because NVAs can be easily added and removed. For more information, see the [Gateway Load Balancer documentation](gateway-overview.md).
66
66
67
-
## Configuration Guidance
67
+
## Configuration guidance
68
68
69
69
The following configuration guidance are best practices for configuring your Azure Load Balancer deployments.
70
70
@@ -101,11 +101,11 @@ Separate your trusted and untrusted traffic on two different tunnel interfaces;
101
101
102
102
Ensure your NVAs MTU limit is increased to at least 1550, or up to the recommended limit of 4000 for scenarios where jumbo frames are used. Without increasing the MTU limit, you can experience packet drops due to the larger packet size from other packets generated by the VXLAN headers.
103
103
104
-
## Retirement Announcements
104
+
## Retirement announcements
105
105
106
106
Along with new improvements and updates to Azure Load Balancer, there are also deprecations to functionalities. It's critical to stay updated and ensure you're making the necessary changes to avoid any potential service disruptions. For a complete list of retirement announcements, see the [Azure Updates page](https://azure.microsoft.com/updates?filters=%5B%22Load+Balancer%22%2C%22Retirements%22%5D) and filter for “Load Balancer” under “Products” and “Retirements” under “Update Type”.
107
107
108
-
### Use or upgrade to Standard Load Balancer.
108
+
### Use or upgrade to Standard Load Balancer
109
109
110
110
[Basic Load Balancer will be retired September 30, 2025](https://azure.microsoft.com/updates?id=azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer) and customers should upgrade from Basic Load Balancer to Standard Load Balancer by then. Standard Load Balancer provides significant improvements including high performance, ultra-low latency, security by default, and SLA of 99.99% availability.
0 commit comments