Skip to content

Commit b01ab3e

Browse files
Merge pull request #279375 from mbender-ms/lb-freshness-June-2024
load balancer - June Freshness - part I
2 parents d6b2021 + a31b92b commit b01ab3e

9 files changed

+17
-17
lines changed

articles/load-balancer/backend-pool-management.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,22 +6,22 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: load-balancer
88
ms.topic: how-to
9-
ms.date: 02/03/2023
9+
ms.date: 06/26/2024
1010
ms.author: mbender
1111
ms.custom: template-how-to, devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
1212
---
1313

1414
# Backend pool management
1515

16-
The backend pool is a critical component of the load balancer. The backend pool defines the group of resources that will serve traffic for a given load-balancing rule.
16+
The backend pool is a critical component of the load balancer. The backend pool defines the group of resources that serve traffic for a given load-balancing rule.
1717

1818
There are two ways of configuring a backend pool:
1919

2020
* Network Interface Card (NIC)
2121

2222
* IP address
2323

24-
To preallocate a backend pool with an IP address range that later will contain virtual machines and Virtual Machine Scale Sets, configure the pool by IP address and virtual network ID.
24+
To preallocate a backend pool with an IP address range that will contain virtual machines and Virtual Machine Scale Sets, configure the pool by IP address and virtual network ID.
2525
This article focuses on configuration of backend pools by IP addresses.
2626

2727
## Configure backend pool by IP address and virtual network
@@ -218,7 +218,7 @@ az vm create \
218218
* The backend resources must be in the same virtual network as the load balancer for IP based LBs
219219
* A load balancer with IP based Backend Pool can’t function as a Private Link service
220220
* [Private endpoint resources](../private-link/private-endpoint-overview.md) can't be placed in an IP based backend pool
221-
* ACI containers aren't currently supported by IP based LBs
221+
* IP-based load balancers don't support ACI containers
222222
* Load balancers or services such as Application Gateway can’t be placed in the backend pool of the load balancer
223223
* Inbound NAT Rules can’t be specified by IP address
224224
* You can configure IP based and NIC based backend pools for the same load balancer. You can’t create a single backend pool that mixes backed addresses targeted by NIC and IP addresses within the same pool.

articles/load-balancer/concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: load-balancer
55
author: mbender-ms
66
ms.service: load-balancer
77
ms.topic: conceptual
8-
ms.date: 05/08/2023
8+
ms.date: 06/26/2024
99
ms.author: mbender
1010
ms.custom: template-concept
1111
---

articles/load-balancer/cross-region-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: load-balancer
88
ms.topic: conceptual
9-
ms.date: 06/23/2023
9+
ms.date: 06/26/2024
1010
ms.author: mbender
1111
ms.custom: template-concept, references_regions
1212
---
@@ -29,6 +29,7 @@ The frontend IP configuration of your cross-region load balancer is static and a
2929

3030
> [!NOTE]
3131
> The backend port of your load balancing rule on cross-region load balancer should match the frontend port of the load balancing rule/inbound nat rule on regional standard load balancer.
32+
3233
### Regional redundancy
3334

3435
Configure regional redundancy by seamlessly linking a cross-region load balancer to your existing regional load balancers.
@@ -82,7 +83,7 @@ It's important to note that floating IP configured on the Azure cross-region Loa
8283

8384
### Health Probes
8485

85-
Azure cross-region Load Balancer utilizes the health of the backend regional load balancers when deciding where to distribute traffic to. Health checks by cross-region load balancer are done automatically every 5 seconds, given that a user has set up health probes on their regional load balancer.
86+
Azure cross-region Load Balancer utilizes the health of the backend regional load balancers when deciding where to distribute traffic to. Health checks by cross-region load balancer are done automatically every 5 seconds, given that health probes are set up on their regional load balancer.
8687

8788
## Build cross region solution on existing Azure Load Balancer
8889

@@ -118,6 +119,7 @@ Cross-region load balancer routes the traffic to the appropriate regional load b
118119
:::image type="content" source="./media/cross-region-overview/multiple-region-global-traffic.png" alt-text="Diagram of multiple region global traffic.":::
119120

120121
#### Participating regions in Azure
122+
121123
* Australia East
122124
* Australia Southeast
123125
* Central India

articles/load-balancer/distribution-mode-concepts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: load-balancer
77
ms.topic: conceptual
8-
ms.date: 05/30/2023
8+
ms.date: 06/26/2024
99
ms.custom: template-concept
1010
#Customer intent: As a administrator, I want to learn about the different distribution modes of Azure Load Balancer so that I can configure the distribution mode for my application.
1111
---
@@ -35,7 +35,7 @@ The five-tuple consists of:
3535
* **Protocol type**
3636

3737
The hash is used to route traffic to healthy backend instances within the backend pool. The algorithm provides stickiness only within a transport session. When the client starts a new session from the same source IP, the source port changes and causes the traffic to go to a different backend instance.
38-
In order to configure hash based distribution, you must select session persistence to be **None** in the Azure portal. This specifies that successive requests from the same client may be handled by any virtual machine.
38+
In order to configure hash based distribution, you must select session persistence to be **None** in the Azure portal. This specifies that successive requests from the same client can be handled by any virtual machine.
3939

4040
![Hash-based distribution](./media/load-balancer-overview/load-balancer-distribution.png)
4141

articles/load-balancer/gateway-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Overview of gateway load balancer SKU for Azure Load Balancer.
55
ms.service: load-balancer
66
author: mbender-ms
77
ms.author: mbender
8-
ms.date: 04/20/2023
8+
ms.date: 06/26/2024
99
ms.topic: conceptual
1010
ms.custom: template-concept, engagement-fy23
1111
---

articles/load-balancer/gateway-partners.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about partners offering their network appliances for use with
44
author: mbender-ms
55
ms.service: load-balancer
66
ms.topic: conceptual
7-
ms.date: 05/22/2023
7+
ms.date: 06/26/2024
88
ms.author: mbender
99
ms.custom: template-concept
1010
---

articles/load-balancer/inbound-nat-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Overview of what is inbound NAT rule, why to use inbound NAT rule,
55
author: mbender-ms
66
ms.service: load-balancer
77
ms.topic: conceptual
8-
ms.date: 05/03/2023
8+
ms.date: 06/26/2024
99
ms.author: mbender
1010
ms.custom: template-concept, engagement-fy23
1111
#Customer intent: As a administrator, I want to create an inbound NAT rule so that I can forward a port to a virtual machine in the backend pool of an Azure Load Balancer.
@@ -17,7 +17,7 @@ An inbound NAT rule is used to forward traffic from a load balancer frontend to
1717

1818
## Why use an inbound NAT rule?
1919

20-
An inbound NAT rule is used for port forwarding. Port forwarding lets you connect to virtual machines by using the load balancer frontend IP address and port number. The load balancer receives the traffic on a port, and based on the inbound NAT rule, forwards the traffic to a designated virtual machine on a specific backend port. Note, unlike load balancing rules, inbound NAT rules do not need a health probe attached to it.
20+
An inbound NAT rule is used for port forwarding. Port forwarding lets you connect to virtual machines by using the load balancer frontend IP address and port number. The load balancer receives the traffic on a port, and based on the inbound NAT rule, forwards the traffic to a designated virtual machine on a specific backend port. Note, unlike load balancing rules, inbound NAT rules don't need a health probe attached to it.
2121

2222
## Types of inbound NAT rules
2323

articles/load-balancer/instance-metadata-service-load-balancer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: load-balancer
88
ms.topic: conceptual
9-
ms.date: 05/04/2023
9+
ms.date: 06/26/2024
1010
ms.author: mbender
1111
ms.custom: template-concept, engagement-fy23
1212
---

articles/load-balancer/ipv6-dual-stack-standard-internal-load-balancer-powershell.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
---
22
title: Deploy an IPv6 dual stack application using Standard Internal Load Balancer in Azure - PowerShell
3-
titlesuffix: Azure Virtual Network
43
description: This article shows how to deploy an IPv6 dual stack application with Standard Internal Load Balancer in Azure virtual network using Azure PowerShell.
54
services: virtual-network
65
author: mbender-ms
7-
manager: mtillman
86
ms.service: virtual-network
97
ms.topic: how-to
10-
ms.date: 06/27/2023
8+
ms.date: 06/27/2024
119
ms.author: mbender
1210
ms.custom: devx-track-azurepowershell, template-how-to, engagement-fy23
1311
---

0 commit comments

Comments
 (0)