You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/components.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,9 +49,9 @@ A health probe is used to determine the health status of the instances in the ba
49
49
50
50
You can define the unhealthy threshold for your health probes. When a probe fails to respond, the load balancer stops sending new connections to the unhealthy instances. A probe failure doesn't affect existing connections. The connection continues until the application:
51
51
52
-
1. Ends the flow
53
-
1. Idle timeout occurs
54
-
1. The VM shuts down
52
+
- Ends the flow
53
+
- Idle timeout occurs
54
+
- The VM shuts down
55
55
56
56
Load balancer provides different health probe types for endpoints: TCP, HTTP, and HTTPS. [Learn more about Load Balancer Health probes](load-balancer-custom-probe-overview.md).
57
57
@@ -73,11 +73,11 @@ A load balancer rule configured with **'protocol - all and port - 0'** is known
73
73
74
74
The load-balancing decision is made per flow. This action is based on the following five-tuple connection:
75
75
76
-
1. source IP address
77
-
1. source port
78
-
1. destination IP address
79
-
1. destination port
80
-
1. protocol
76
+
- source IP address
77
+
- source port
78
+
- destination IP address
79
+
- destination port
80
+
- protocol
81
81
82
82
The HA ports load-balancing rules help you with critical scenarios, such as high availability and scale for network virtual appliances (NVAs) inside virtual networks. The feature can help when a large number of ports must be load-balanced.
1. Learn about load balancer [limits](../azure-resource-manager/management/azure-subscription-service-limits.md)
113
-
1. Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
114
-
1. Load Balancer backend pool can't consist of a [Private Endpoint](../private-link/private-endpoint-overview.md).
115
-
1. Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
116
-
1. A load balancer rule can't span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
117
-
1. Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules.
118
-
1. You can only have one Public Load Balancer (NIC based) and one internal Load Balancer (NIC based) per availability set. However, this constraint doesn't apply to IP-based load balancers.
112
+
- Learn about load balancer [limits](../azure-resource-manager/management/azure-subscription-service-limits.md)
113
+
- Load balancer provides load balancing and port forwarding for specific TCP or UDP protocols. Load-balancing rules and inbound NAT rules support TCP and UDP, but not other IP protocols including ICMP.
114
+
- Load Balancer backend pool can't consist of a [Private Endpoint](../private-link/private-endpoint-overview.md).
115
+
- Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
116
+
- A load balancer rule can't span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
117
+
- Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules.
118
+
- You can only have one Public Load Balancer (NIC based) and one internal Load Balancer (NIC based) per availability set. However, this constraint doesn't apply to IP-based load balancers.
Copy file name to clipboardExpand all lines: articles/load-balancer/concepts.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,11 +25,11 @@ By default, Azure Load Balancer uses a five-tuple hash.
25
25
26
26
The five-tuple includes:
27
27
28
-
1.**Source IP address**
29
-
1.**Source port**
30
-
1.**Destination IP address**
31
-
1.**Destination port**
32
-
1.**IP protocol number to map flows to available servers**
28
+
-**Source IP address**
29
+
-**Source port**
30
+
-**Destination IP address**
31
+
-**Destination port**
32
+
-**IP protocol number to map flows to available servers**
33
33
34
34
You can also use session affinity [distribution mode](distribution-mode-concepts.md) which uses two-tuple or three-tuple based load balancing.
35
35
@@ -42,9 +42,9 @@ A response to an inbound flow is always a response from a virtual machine. When
42
42
43
43
## Next steps
44
44
45
-
1. Learn more about [Azure Load Balancer](load-balancer-overview.md).
46
-
1. Learn about the [components](components.md) that make up Azure Load Balancer.
47
-
1. Learn about [Health Probes](load-balancer-custom-probe-overview.md).
48
-
1. Learn about Azure Load Balancer's traffic [distribution modes](distribution-mode-concepts.md)
49
-
1. See [Create a public Standard Load Balancer](quickstart-load-balancer-standard-public-portal.md) to get started with using a Load Balancer: create one, create VMs with a custom IIS extension installed, and load balance the web app between the VMs.
50
-
1. Learn about [Azure Load Balancer outbound connections](load-balancer-outbound-connections.md).
45
+
- Learn more about [Azure Load Balancer](load-balancer-overview.md).
46
+
- Learn about the [components](components.md) that make up Azure Load Balancer.
47
+
- Learn about [Health Probes](load-balancer-custom-probe-overview.md).
48
+
- Learn about Azure Load Balancer's traffic [distribution modes](distribution-mode-concepts.md)
49
+
- See [Create a public Standard Load Balancer](quickstart-load-balancer-standard-public-portal.md) to get started with using a Load Balancer: create one, create VMs with a custom IIS extension installed, and load balance the web app between the VMs.
50
+
- Learn about [Azure Load Balancer outbound connections](load-balancer-outbound-connections.md).
Copy file name to clipboardExpand all lines: articles/load-balancer/distribution-mode-concepts.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ There's no downtime when switching from one distribution mode to another on a lo
28
28
Azure Load Balancer uses a five-tuple hash based distribution mode by default.
29
29
30
30
The five-tuple consists of:
31
-
1.**Source IP**
32
-
1.**Source port**
33
-
1.**Destination IP**
34
-
1.**Destination port**
35
-
1.**Protocol type**
31
+
-**Source IP**
32
+
-**Source port**
33
+
-**Destination IP**
34
+
-**Destination port**
35
+
-**Protocol type**
36
36
37
37
The hash is used to route traffic to healthy backend instances within the backend pool. The algorithm provides stickiness only within a transport session. When the client starts a new session from the same source IP, the source port changes and causes the traffic to go to a different backend instance.
38
38
@@ -47,21 +47,21 @@ Session persistence is also known session affinity, source IP affinity, or clien
47
47
48
48
Session persistence mode has two configuration types:
49
49
50
-
***Client IP (2-tuple)** - Specifies that successive requests from the same client IP address are handled by the same backend instance.
51
-
***Client IP and protocol (3-tuple)** - Specifies that successive requests from the same client IP address and protocol combination are handled by the same backend instance.
50
+
-**Client IP (2-tuple)** - Specifies that successive requests from the same client IP address are handled by the same backend instance.
52
51
53
-
The following figure illustrates a two-tuple configuration. Notice how the two-tuple runs through the load balancer to virtual machine 1 (VM1). VM1 is backed up by VM2 and VM3.
52
+
-**Client IP and protocol (3-tuple)** - Specifies that successive requests from the same client IP address and protocol combination are handled by the same backend instance.
54
53
55
-
:::image type="content" source="./media/load-balancer-distribution-mode/load-balancer-session-affinity.png" alt-text="Screenshot of two-tuple session affinity distribution mode diagram showing traffic routing through load balancer to virtual machines.":::
54
+
The following figure illustrates a two-tuple configuration. Notice how the two-tuple runs through the load balancer to virtual machine 1 (VM1). VM1 is backed up by VM2 and VM3.
56
55
56
+
:::image type="content" source="./media/load-balancer-distribution-mode/load-balancer-session-affinity.png" alt-text="Screenshot of two-tuple session affinity distribution mode diagram showing traffic routing through load balancer to virtual machines.">:::
57
57
## Use cases
58
58
59
59
Source IP affinity with client IP and protocol (source IP affinity three-tuple), solves an incompatibility between Azure Load Balancer and Remote Desktop Gateway (RD Gateway).
60
60
61
61
Another use case scenario is media upload. The data upload happens through UDP, but the control plane is achieved through TCP:
62
62
63
-
1. A client starts a TCP session to the load-balanced public address and is directed to a specific DIP. The channel is left active to monitor the connection health.
64
-
1. A new UDP session from the same client computer is started to the same load-balanced public endpoint. The connection is directed to the same DIP endpoint as the previous TCP connection. The media upload can be executed at high throughput while maintaining a control channel through TCP.
63
+
- A client starts a TCP session to the load-balanced public address and is directed to a specific DIP. The channel is left active to monitor the connection health.
64
+
- A new UDP session from the same client computer is started to the same load-balanced public endpoint. The connection is directed to the same DIP endpoint as the previous TCP connection. The media upload can be executed at high throughput while maintaining a control channel through TCP.
65
65
66
66
> [!NOTE]
67
67
> When Load Balancer backend pool members change either by removing or adding a virtual machine, the distribution of client requests is recomputed. You can't depend on new connections from existing clients to end up at the same server. Additionally, using source IP affinity distribution mode can cause an uneven distribution of traffic. Clients that run behind proxies might be seen as one unique client application.
0 commit comments