Skip to content

Commit 961e070

Browse files
authored
Merge pull request #109688 from christiankuhtz/patch-307
tweak
2 parents 7d9386c + 8b74a8e commit 961e070

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

articles/virtual-network/nat-gateway-resource.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: overview
1414
ms.tgt_pltfrm: na
1515
ms.workload: infrastructure-services
16-
ms.date: 03/30/2020
16+
ms.date: 03/31/2020
1717
ms.author: allensu
1818
---
1919

@@ -177,33 +177,35 @@ NAT gateways take precedence over outbound scenarios of the subnet. Basic load b
177177
#### Zone isolation with zonal stacks
178178

179179
<p align="center">
180-
<img src="media/nat-overview/az-directions.svg" width="425" title="Virtual Network NAT with availability zones">
180+
<img src="media/nat-overview/az-directions.svg" width="425" title="Virtual Network NAT with zone isolation, creating multiple "zonal stacks"">
181181
</p>
182182

183183
*Figure: Virtual Network NAT with zone isolation, creating multiple "zonal stacks"*
184184

185185
Even without availability zones, NAT is resilient and can survive multiple infrastructure component failures. Availability zones build on this resiliency with zone isolation scenarios for NAT.
186186

187-
Virtual networks and their subnets are regional constructs. Subnets are not aligned with a zone.
187+
Virtual networks and their subnets are regional constructs. Subnets aren't restricted to a zone.
188188

189-
A zonal promise for zone isolation exists when a virtual machine instance using a NAT gateway resource is in the same zone as the NAT gateway resource and its public IP addresses. The pattern you want to use for zone isolation is creating a "zonal stack" per availability zone. This "zonal stack" consists of virtual machine instances, NAT gateway resources, public IP address and/or prefix resources on a subnet that is assumed to be serving only the same zone. The control plane operations and data plane are then constrained to the specified zone.
189+
A zonal promise for zone isolation exists when a virtual machine instance using a NAT gateway resource is in the same zone as the NAT gateway resource and its public IP addresses. The pattern you want to use for zone isolation is creating a "zonal stack" per availability zone. This "zonal stack" consists of virtual machine instances, NAT gateway resources, public IP address and/or prefix resources on a subnet that is assumed to be serving only the same zone. The control plane operations and data plane are then aligned with and constrained to the specified zone.
190190

191191
Failure in a zone other than where your scenario exists is expected to be without impact to NAT. Outbound traffic from virtual machines in the same zone will fail because of zone isolation.
192192

193+
#### Integrating inbound endpoints
194+
193195
If your scenario requires inbound endpoints, you have two options:
194196

195197
| Option | Pattern | Example | Pro | Con |
196198
|---|---|---|---|---|
197-
| (1) | **Align** the inbound endpoints with the respective zonal stacks you're creating for outbound. | Create a standard load balancer with zonal frontend. | Same health model and failure mode for inbound and outbound. Simpler to operate. | Individual IP addresses per zone may need to be masked by a common DNS name. |
198-
| (2) | **Overlay** the zonal stacks with a cross-zone inbound endpoint. | Create a standard load balancer with zone-redundant frontend. | Single IP address for inbound endpoint. | Varying health model and failure modes for inbound and outbound. More complex to operate. |
199+
| (1) | **Align** the inbound endpoints with the respective **zonal stacks** you're creating for outbound. | Create a standard load balancer with zonal frontend. | Same health model and failure mode for inbound and outbound. Simpler to operate. | Individual IP addresses per zone may need to be masked by a common DNS name. |
200+
| (2) | **Overlay** the zonal stacks with a **cross-zone** inbound endpoint. | Create a standard load balancer with zone-redundant frontend. | Single IP address for inbound endpoint. | Varying health model and failure modes for inbound and outbound. More complex to operate. |
199201

200202
>[!NOTE]
201203
> A zone-isolated NAT gateway requires IP addresses to match the zone of the NAT gateway. NAT gateway resources with IP addresses from a different zone or without a zone aren't allowed.
202204
203205
#### Cross-zone outbound scenarios not supported
204206

205207
<p align="center">
206-
<img src="media/nat-overview/az-directions2.svg" width="425" title="zone-spanning Virtual Network NAT">
208+
<img src="media/nat-overview/az-directions2.svg" width="425" title="Virtual Network NAT not compatible with zone-spanning subnet">
207209
</p>
208210

209211
*Figure: Virtual Network NAT not compatible with zone-spanning subnet*

0 commit comments

Comments
 (0)