Skip to content

Commit b873d5a

Browse files
Update design guidance to not block health probe w/ NSG rules
1 parent 5d54915 commit b873d5a

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/load-balancer/load-balancer-custom-probe-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,9 @@ For HTTP/S probes, if the configured interval is longer than the above timeout p
100100

101101
* To test a health probe failure or mark down an individual instance, use a [network security group](../virtual-network/network-security-groups-overview.md) to explicitly block the health probe. Create an NSG rule to block the destination port or [source IP](#probe-source-ip-address) to simulate the failure of a probe.
102102

103-
* Unlike load balancing rules, inbound NAT rules do not need a health probe attached to it.
103+
* Unlike load balancing rules, inbound NAT rules do not need a health probe attached to it.
104+
105+
* It is not recommended to block the Azure Load Balancer health probe IP or port with NSG rules. Doing so can result in the health probes being unable to determine the accurate health of your backend instances.
104106

105107
## Monitoring
106108

0 commit comments

Comments
 (0)