You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/howto-load-balancer-imds.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: load-balancer
6
6
author: mbender-ms
7
7
ms.service: load-balancer
8
8
ms.topic: how-to
9
-
ms.date: 05/08/2023
9
+
ms.date: 06/28/2024
10
10
ms.author: mbender
11
11
ms.custom: template-how-to
12
12
---
@@ -23,7 +23,7 @@ ms.custom: template-how-to
23
23
24
24
## Schema breakdown
25
25
26
-
| Data | Description | Version introduced |
26
+
|**Data**|**Description**|**Version introduced**|
27
27
|------|-------------|--------------------|
28
28
| `publicIpAddresses` | The instance level Public or Private IP of the specific Virtual Machine instance | 2020-10-01
29
29
| `inboundRules` | List of load balancing rules or inbound NAT rules using which the Load Balancer directs traffic to the specific Virtual Machine instance. Frontend IP addresses and the Private IP addresses listed here belong to the Load Balancer. | 2020-10-01
This article describes how to use Azure Load Balancer with multiple IP addresses on a secondary network interface (NIC). For this scenario, we have two VMs running Windows, each with a primary and a secondary NIC. Each of the secondary NICs has two IP configurations. Each VM hosts both websites contoso.com and fabrikam.com. Each website is bound to one of the IP configurations on the secondary NIC. We use Azure Load Balancer to expose two frontend IP addresses, one for each website, to distribute traffic to the respective IP configuration for the website. This scenario uses the same port number across both frontends, as well as both backend pool IP addresses.
21
+
This article describes how to use Azure Load Balancer with multiple IP addresses on a secondary network interface (NIC). For this scenario, we have two VMs running Windows, each with a primary and a secondary NIC. Each of the secondary NICs has two IP configurations. Each VM hosts both websites contoso.com and fabrikam.com. Each website is bound to one of the IP configurations on the secondary NIC. We use Azure Load Balancer to expose two frontend IP addresses, one for each website, to distribute traffic to the respective IP configuration for the website. This scenario uses the same port number across both frontends, and both backend pool IP addresses.
22
22
23
23
## Steps to load balance on multiple IP configurations
24
24
@@ -61,9 +61,9 @@ Follow the steps below to achieve the scenario outlined in this article:
You do not need to associate the secondary IP configurations with public IPs for the purpose of this tutorial. Edit the command to remove the public IP association part.
64
+
You don't need to associate the secondary IP configurations with public IPs in this tutorial. Edit the command to remove the public IP association part.
65
65
66
-
6. Complete steps 4 through 6 of this article again for VM2. Be sure to replace the VM name to VM2 when doing this. Note that you do not need to create a virtual network for the second VM. You may or may not create a new subnet based on your use case.
66
+
6. Complete steps 4 through 6 of this article again for VM2. Be sure to replace the VM name to VM2 when doing this. You don't need to create a virtual network for the second VM. You can create a new subnet based on your use case.
67
67
68
68
7. Create two public IP addresses and store them in the appropriate variables as shown:
69
69
@@ -127,7 +127,7 @@ Follow the steps below to achieve the scenario outlined in this article:
127
127
$nic2 | Set-AzNetworkInterface
128
128
```
129
129
130
-
13. Finally, you must configure DNS resource records to point to the respective frontend IP address of the Load Balancer. You may host your domains in Azure DNS. For more information about using Azure DNS with Load Balancer, see [Using Azure DNS with other Azure services](../dns/dns-for-azure-services.md).
130
+
13. Finally, you must configure DNS resource records to point to the respective frontend IP address of the Load Balancer. You can host your domains in Azure DNS. For more information about using Azure DNS with Load Balancer, see [Using Azure DNS with other Azure services](../dns/dns-for-azure-services.md).
131
131
132
132
## Next steps
133
133
- Learn more about how to combine load balancing services in Azure in [Using load-balancing services in Azure](../traffic-manager/traffic-manager-load-balancing-azure.md).
| NIC network security group | Select **Advanced**|
88
-
| Configure network security group | Select **Create new**.</br> In **Create network security group**, enter **myNSG** in **Name**.</br> In **Inbound rules**, select **+Add an inbound rule**.</br> In **Service**, select **HTTP**.</br> In **Priority**, enter **100**.</br> In **Name**, enter **myNSGrule**</br> Select **Add**</br> Select **OK**|
88
+
| Configure network security group | Select **Create new**.</br> In **Create network security group**, enter **myNSG** in **Name**.</br> In **Inbound rules**, select **+Add an inbound rule**.</br> In **Service**, select **HTTP**.</br> In **Priority**, enter **100**.</br> In **Name**, enter **myNSGrule**.</br> Select **Add**.</br> Select **OK**.|
89
89
90
90
6. Select **Review + create**.
91
91
@@ -180,7 +180,7 @@ You connect to **myVM1** and **myVM2** with Azure Bastion and configure the seco
180
180
181
181
6. Select **Allow** for Bastion to use the clipboard.
182
182
183
-
7. On the server desktop, navigate to Start > Windows Administrative Tools > Windows PowerShell > Windows PowerShell.
183
+
7. On the server desktop, navigate to **Start > Windows Administrative Tools > Windows PowerShell > Windows PowerShell**.
184
184
185
185
8. In the PowerShell window, execute the `route print` command, which returns output similar to the following output for a virtual machine with two attached network interfaces:
186
186
@@ -422,14 +422,14 @@ During the creation of the load balancer, you configure:
422
422
| Name | Enter **Frontend-contoso**. |
423
423
| IP version | Select **IPv4**. |
424
424
| IP type | Select **IP address**. |
425
-
| Public IP address | Select **Create new**.</br> Enter **myPublicIP-contoso** for **Name** </br> Select **Zone-redundant** in **Availability zone**.</br> Leave the default of **Microsoft Network** for **Routing preference**.</br> Select **OK**. |
425
+
| Public IP address | Select **Create new**.</br> Enter **myPublicIP-contoso** for **Name** </br> Select **Zone-redundant** in **Availability zone**.</br> Leave the default of **Microsoft Network** for **Routing preference**.</br> Select **OK**. |
426
426
427
427
> [!NOTE]
428
428
> IPv6 isn't currently supported with Routing Preference or Cross-region load-balancing (Global Tier).
429
429
>
430
430
> For more information on IP prefixes, see [Azure Public IP address prefix](../virtual-network/ip-services/public-ip-address-prefix.md).
431
431
>
432
-
> In regions with [Availability Zones](../availability-zones/az-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json#availability-zones), you have the option to select no-zone (default option), a specific zone, or zone-redundant. The choice will depend on your specific domain failure requirements. In regions without Availability Zones, this field won't appear.</br> For more information on availability zones, see [Availability zones overview](../availability-zones/az-overview.md).
432
+
> In regions with [Availability Zones](../availability-zones/az-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json#availability-zones), you have the option to select no-zone (default option), a specific zone, or zone-redundant. The choice will depend on your specific domain failure requirements. In regions without Availability Zones, this field won't appear.</br> For more information on availability zones, see [Availability zones overview](../availability-zones/az-overview.md).
433
433
434
434
7. Select **Add**.
435
435
@@ -442,7 +442,7 @@ During the creation of the load balancer, you configure:
442
442
| Name | Enter **Frontend-fabrikam**. |
443
443
| IP version | Select **IPv4**. |
444
444
| IP type | Select **IP address**. |
445
-
| Public IP address | Select **Create new**.</br> Enter **myPublicIP-fabrikam** for **Name** </br> Select **Zone-redundant** in **Availability zone**.</br> Leave the default of **Microsoft Network** for **Routing preference**.</br> Select **OK**. |
445
+
| Public IP address | Select **Create new**.</br> Enter **myPublicIP-fabrikam** for **Name** </br> Select **Zone-redundant** in **Availability zone**.</br> Leave the default of **Microsoft Network** for **Routing preference**.</br> Select **OK**. |
446
446
447
447
10. Select **Add**.
448
448
@@ -499,7 +499,7 @@ During the creation of the load balancer, you configure:
499
499
| Protocol | Select **TCP**. |
500
500
| Port | Enter **80**. |
501
501
| Backend port | Enter **80**. |
502
-
| Health probe | Select **Create new**.</br> In **Name**, enter **myHealthProbe-contoso**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **OK**. |
502
+
| Health probe | Select **Create new**.</br> In **Name**, enter **myHealthProbe-contoso**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **OK**. |
503
503
| Session persistence | Select **None**. |
504
504
| Idle timeout (minutes) | Enter or select **15**. |
505
505
| TCP reset | Select **Enabled**. |
@@ -521,7 +521,7 @@ During the creation of the load balancer, you configure:
521
521
| Protocol | Select **TCP**. |
522
522
| Port | Enter **80**. |
523
523
| Backend port | Enter **80**. |
524
-
| Health probe | Select **Create new**.</br> In **Name**, enter **myHealthProbe-fabrikam**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **OK**. |
524
+
| Health probe | Select **Create new**.</br> In **Name**, enter **myHealthProbe-fabrikam**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **OK**. |
525
525
| Session persistence | Select **None**. |
526
526
| Idle timeout (minutes) | Enter or select **15**. |
527
527
| TCP reset | Select **Enabled**. |
@@ -583,4 +583,4 @@ If you're not going to continue to use this application, delete the virtual mach
583
583
Advance to the next article to learn how to create a cross-region load balancer:
584
584
585
585
> [!div class="nextstepaction"]
586
-
> [Create a cross-region load balancer using the Azure portal](tutorial-cross-region-portal.md)
586
+
> [Create a cross-region load balancer using the Azure portal](tutorial-cross-region-portal.md)
#Customer intent: I want to create a internal load balancer so that I can load balance internal traffic to VMs.
@@ -97,7 +97,7 @@ During the creation of the load balancer, you configure:
97
97
| Protocol | Select **TCP**. |
98
98
| Port | Enter **80**. |
99
99
| Backend port | Enter **80**. |
100
-
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **OK**. |
100
+
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **TCP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
101
101
| Session persistence | Select **None**. |
102
102
| Idle timeout (minutes) | Enter or select **15**. |
#Customer intent: I want to create a load balancer so that I can load balance internet traffic to VMs.
@@ -81,13 +81,13 @@ During the creation of the load balancer, you configure:
81
81
1. Select **Zone-redundant** in **Availability zone**.
82
82
83
83
> [!NOTE]
84
-
> In regions with [Availability Zones](../availability-zones/az-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json#availability-zones), you have the option to select no-zone (default option), a specific zone, or zone-redundant. The choice will depend on your specific domain failure requirements. In regions without Availability Zones, this field won't appear.</br> For more information on availability zones, see [Availability zones overview](../availability-zones/az-overview.md).
84
+
> In regions with [Availability Zones](../availability-zones/az-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json#availability-zones), you have the option to select no-zone (default option), a specific zone, or zone-redundant. The choice will depend on your specific domain failure requirements. In regions without Availability Zones, this field won't appear.</br> For more information on availability zones, see [Availability zones overview](../availability-zones/az-overview.md).
85
85
86
86
1. Leave the default of **Microsoft Network** for **Routing preference**.
87
87
88
-
1. Select **OK**.
88
+
1. Select **Save**.
89
89
90
-
1. Select **Add**.
90
+
1. Select **Save**.
91
91
92
92
1. Select **Next: Backend pools** at the bottom of the page.
93
93
@@ -116,7 +116,7 @@ During the creation of the load balancer, you configure:
116
116
| Protocol | Select **TCP**|
117
117
| Port | Enter **80**|
118
118
| Backend port | Enter **80**|
119
-
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **HTTP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
119
+
| Health probe | Select **Create new**.</br> In **Name**, enter **lb-health-probe**.</br> Select **HTTP** in **Protocol**.</br> Leave the rest of the defaults, and select **Save**. |
120
120
| Session persistence | Select **None**. |
121
121
| Idle timeout (minutes) | Enter or select **15**|
Copy file name to clipboardExpand all lines: includes/load-balancer-create-bastion.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,10 @@ In this section, you create a virtual network with a resource subnet, an Azure B
27
27
|---|---|
28
28
|**Project details**||
29
29
| Subscription | Select your subscription. |
30
-
| Resource group | Select **Create new**. </br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
30
+
| Resource group | Select **load-balancer-rg** from the dropdown or **Create new** if it doesn't exist.</br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
31
31
|**Instance details**||
32
32
| Name | Enter **lb-vnet**. |
33
-
| Region | Select **East US**. |
33
+
| Region | Select **(US) East US**. |
34
34
35
35
:::image type="content" source="./media/load-balancer-internal-create-bastion-include/create-virtual-network-basics.png" alt-text="Screenshot of Basics tab of Create virtual network in the Azure portal.":::
36
36
@@ -42,7 +42,7 @@ In this section, you create a virtual network with a resource subnet, an Azure B
42
42
|**Azure Bastion**||
43
43
| Enable Azure Bastion | Select checkbox. |
44
44
| Azure Bastion host name | Enter **lb-bastion**. |
45
-
| Azure Bastion public IP address | Select **Create new**.</br> Enter **lb-bastion-ip** in Name.</br> Select **OK**. |
45
+
| Azure Bastion public IP address | Select **Create new**.</br> Enter **lb-bastion-ip** in Name.</br> Select **OK**. |
46
46
47
47
6. Select the **IP addresses** tab, or **Next** at the bottom of the page.
48
48
7. On **Create virtual network** page, enter or select the following information:
@@ -52,7 +52,8 @@ In this section, you create a virtual network with a resource subnet, an Azure B
52
52
|**Add IPv4 address space**||
53
53
| IPv4 address space | Enter **10.0.0.0/16 (65,356 addresses)**. |
54
54
|**Subnets**| Select the **default** subnet link to edit. |
55
-
| Subnet template | Leave the default **Default**. |
55
+
|**Edit subnet**||
56
+
| Subnet purpose | Leave the default **Default**. |
Copy file name to clipboardExpand all lines: includes/load-balancer-nat-gateway.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@
12
12
13
13
## Create NAT gateway
14
14
15
-
In this section, you'll create a NAT gateway for outbound internet access for resources in the virtual network. For other options for outbound rules, check out [Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections)
15
+
In this section, you create a NAT gateway for outbound internet access for resources in the virtual network. For other options for outbound rules, check out [Network Address Translation (SNAT) for outbound connections](/azure/load-balancer/load-balancer-outbound-connections)
16
16
17
17
1. Sign in to the [Azure portal](https://portal.azure.com).
18
18
@@ -26,11 +26,11 @@ In this section, you'll create a NAT gateway for outbound internet access for re
26
26
| ------- | ----- |
27
27
|**Project details**||
28
28
| Subscription | Select your subscription. |
29
-
| Resource group | Select **Create new**.</br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
29
+
| Resource group | Select **Create new**.</br> Enter **load-balancer-rg** in Name.</br> Select **OK**. |
30
30
|**Instance details**||
31
31
| NAT gateway name | Enter **lb-nat-gateway**. |
32
32
| Region | Select **East US**. |
33
-
| Availability zone | Select **None**. |
33
+
| Availability zone | Select **No zone**. |
34
34
| Idle timeout (minutes) | Enter **15**. |
35
35
36
36
:::image type="content" source="./media/load-balancer-internal-create-bastion-include/create-nat-gateway.png" alt-text="Screenshot of Create network address translation gateway window in the Azure portal.":::
0 commit comments