Skip to content

Commit 3fe6b89

Browse files
committed
Updates per Review - Increased acrlinx and fixed
1 parent ca55820 commit 3fe6b89

5 files changed

Lines changed: 53 additions & 53 deletions

File tree

articles/load-balancer/components.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,9 @@ A health probe is used to determine the health status of the instances in the ba
4949

5050
You can define the unhealthy threshold for your health probes. When a probe fails to respond, the load balancer stops sending new connections to the unhealthy instances. A probe failure doesn't affect existing connections. The connection continues until the application:
5151

52-
1. Ends the flow
53-
1. Idle timeout occurs
54-
1. The VM shuts down
52+
- Ends the flow
53+
- Idle timeout occurs
54+
- The VM shuts down
5555

5656
Load balancer provides different health probe types for endpoints: TCP, HTTP, and HTTPS. [Learn more about Load Balancer Health probes](load-balancer-custom-probe-overview.md).
5757

@@ -73,11 +73,11 @@ A load balancer rule configured with **'protocol - all and port - 0'** is known
7373

7474
The load-balancing decision is made per flow. This action is based on the following five-tuple connection:
7575

76-
1. source IP address
77-
1. source port
78-
1. destination IP address
79-
1. destination port
80-
1. protocol
76+
- source IP address
77+
- source port
78+
- destination IP address
79+
- destination port
80+
- protocol
8181

8282
The HA ports load-balancing rules help you with critical scenarios, such as high availability and scale for network virtual appliances (NVAs) inside virtual networks. The feature can help when a large number of ports must be load-balanced.
8383

@@ -109,13 +109,13 @@ Basic load balancer doesn't support outbound rules.
109109

110110
## Limitations
111111

112-
1. Learn about load balancer [limits](../azure-resource-manager/management/azure-subscription-service-limits.md)
113-
1. Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
114-
1. Load Balancer backend pool can't consist of a [Private Endpoint](../private-link/private-endpoint-overview.md).
115-
1. Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
116-
1. A load balancer rule can't span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
117-
1. Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules.
118-
1. You can only have one Public Load Balancer (NIC based) and one internal Load Balancer (NIC based) per availability set. However, this constraint doesn't apply to IP-based load balancers.
112+
- Learn about load balancer [limits](../azure-resource-manager/management/azure-subscription-service-limits.md)
113+
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
114+
- Load Balancer backend pool can't consist of a [Private Endpoint](../private-link/private-endpoint-overview.md).
115+
- Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
116+
- A load balancer rule can't span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
117+
- Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules.
118+
- You can only have one Public Load Balancer (NIC based) and one internal Load Balancer (NIC based) per availability set. However, this constraint doesn't apply to IP-based load balancers.
119119

120120
## Next step
121121

articles/load-balancer/concepts.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,11 @@ By default, Azure Load Balancer uses a five-tuple hash.
2525

2626
The five-tuple includes:
2727

28-
1. **Source IP address**
29-
1. **Source port**
30-
1. **Destination IP address**
31-
1. **Destination port**
32-
1. **IP protocol number to map flows to available servers**
28+
- **Source IP address**
29+
- **Source port**
30+
- **Destination IP address**
31+
- **Destination port**
32+
- **IP protocol number to map flows to available servers**
3333

3434
You can also use session affinity [distribution mode](distribution-mode-concepts.md) which uses two-tuple or three-tuple based load balancing.
3535

@@ -42,9 +42,9 @@ A response to an inbound flow is always a response from a virtual machine. When
4242

4343
## Next steps
4444

45-
1. Learn more about [Azure Load Balancer](load-balancer-overview.md).
46-
1. Learn about the [components](components.md) that make up Azure Load Balancer.
47-
1. Learn about [Health Probes](load-balancer-custom-probe-overview.md).
48-
1. Learn about Azure Load Balancer's traffic [distribution modes](distribution-mode-concepts.md)
49-
1. See [Create a public Standard Load Balancer](quickstart-load-balancer-standard-public-portal.md) to get started with using a Load Balancer: create one, create VMs with a custom IIS extension installed, and load balance the web app between the VMs.
50-
1. Learn about [Azure Load Balancer outbound connections](load-balancer-outbound-connections.md).
45+
- Learn more about [Azure Load Balancer](load-balancer-overview.md).
46+
- Learn about the [components](components.md) that make up Azure Load Balancer.
47+
- Learn about [Health Probes](load-balancer-custom-probe-overview.md).
48+
- Learn about Azure Load Balancer's traffic [distribution modes](distribution-mode-concepts.md)
49+
- See [Create a public Standard Load Balancer](quickstart-load-balancer-standard-public-portal.md) to get started with using a Load Balancer: create one, create VMs with a custom IIS extension installed, and load balance the web app between the VMs.
50+
- Learn about [Azure Load Balancer outbound connections](load-balancer-outbound-connections.md).

articles/load-balancer/distribution-mode-concepts.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ There's no downtime when switching from one distribution mode to another on a lo
2828
Azure Load Balancer uses a five-tuple hash based distribution mode by default.
2929

3030
The five-tuple consists of:
31-
1. **Source IP**
32-
1. **Source port**
33-
1. **Destination IP**
34-
1. **Destination port**
35-
1. **Protocol type**
31+
- **Source IP**
32+
- **Source port**
33+
- **Destination IP**
34+
- **Destination port**
35+
- **Protocol type**
3636

3737
The hash is used to route traffic to healthy backend instances within the backend pool. The algorithm provides stickiness only within a transport session. When the client starts a new session from the same source IP, the source port changes and causes the traffic to go to a different backend instance.
3838

@@ -47,21 +47,21 @@ Session persistence is also known session affinity, source IP affinity, or clien
4747

4848
Session persistence mode has two configuration types:
4949

50-
* **Client IP (2-tuple)** - Specifies that successive requests from the same client IP address are handled by the same backend instance.
51-
* **Client IP and protocol (3-tuple)** - Specifies that successive requests from the same client IP address and protocol combination are handled by the same backend instance.
50+
- **Client IP (2-tuple)** - Specifies that successive requests from the same client IP address are handled by the same backend instance.
5251

53-
The following figure illustrates a two-tuple configuration. Notice how the two-tuple runs through the load balancer to virtual machine 1 (VM1). VM1 is backed up by VM2 and VM3.
52+
- **Client IP and protocol (3-tuple)** - Specifies that successive requests from the same client IP address and protocol combination are handled by the same backend instance.
5453

55-
:::image type="content" source="./media/load-balancer-distribution-mode/load-balancer-session-affinity.png" alt-text="Screenshot of two-tuple session affinity distribution mode diagram showing traffic routing through load balancer to virtual machines.":::
54+
The following figure illustrates a two-tuple configuration. Notice how the two-tuple runs through the load balancer to virtual machine 1 (VM1). VM1 is backed up by VM2 and VM3.
5655

56+
:::image type="content" source="./media/load-balancer-distribution-mode/load-balancer-session-affinity.png" alt-text="Screenshot of two-tuple session affinity distribution mode diagram showing traffic routing through load balancer to virtual machines.">:::
5757
## Use cases
5858

5959
Source IP affinity with client IP and protocol (source IP affinity three-tuple), solves an incompatibility between Azure Load Balancer and Remote Desktop Gateway (RD Gateway).
6060

6161
Another use case scenario is media upload. The data upload happens through UDP, but the control plane is achieved through TCP:
6262

63-
1. A client starts a TCP session to the load-balanced public address and is directed to a specific DIP. The channel is left active to monitor the connection health.
64-
1. A new UDP session from the same client computer is started to the same load-balanced public endpoint. The connection is directed to the same DIP endpoint as the previous TCP connection. The media upload can be executed at high throughput while maintaining a control channel through TCP.
63+
- A client starts a TCP session to the load-balanced public address and is directed to a specific DIP. The channel is left active to monitor the connection health.
64+
- A new UDP session from the same client computer is started to the same load-balanced public endpoint. The connection is directed to the same DIP endpoint as the previous TCP connection. The media upload can be executed at high throughput while maintaining a control channel through TCP.
6565

6666
> [!NOTE]
6767
> When Load Balancer backend pool members change either by removing or adding a virtual machine, the distribution of client requests is recomputed. You can't depend on new connections from existing clients to end up at the same server. Additionally, using source IP affinity distribution mode can cause an uneven distribution of traffic. Clients that run behind proxies might be seen as one unique client application.

0 commit comments

Comments
 (0)