You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/cross-region-overview.md
+54-54Lines changed: 54 additions & 54 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: load-balancer
6
6
author: mbender-ms
7
7
ms.service: azure-load-balancer
8
8
ms.topic: concept-article
9
-
ms.date: 02/20/2025
9
+
ms.date: 01/29/2026
10
10
ms.author: mbender
11
11
ms.custom: references_regions
12
12
# Customer intent: "As a cloud architect, I want to implement a global load balancer, so that I can ensure high availability and geo-redundancy for applications, optimizing traffic distribution while minimizing latency."
@@ -16,17 +16,17 @@ ms.custom: references_regions
16
16
17
17
Azure Standard Load Balancer supports global load balancing enabling geo-redundant high availability scenarios such as:
18
18
19
-
* Incoming traffic originating from multiple regions.
20
-
*[Instant global failover](#regional-redundancy) to the next optimal regional deployment.
21
-
* Load distribution across regions to the closest Azure region with [ultra-low latency](#ultra-low-latency).
22
-
* Ability to [scale up/down](#ability-to-scale-updown-behind-a-single-endpoint) behind a single endpoint.
23
-
* Static anycast global IP address
24
-
*[Client IP preservation](#client-ip-preservation)
25
-
*[Build on existing load balancer](#build-cross-region-solution-on-existing-azure-load-balancer) solution with no learning curve
19
+
- Incoming traffic originating from multiple regions.
20
+
-[Instant global failover](#regional-redundancy) to the next optimal regional deployment.
21
+
- Load distribution across regions to the closest Azure region with [ultra-low latency](#ultra-low-latency).
22
+
- Ability to [scale up/down](#ability-to-scale-updown-behind-a-single-endpoint) behind a single endpoint.
23
+
- Static anycast global IP address
24
+
-[Client IP preservation](#client-ip-preservation)
25
+
-[Build on existing load balancer](#build-cross-region-solution-on-existing-azure-load-balancer) solution with no learning curve
26
26
27
27
The frontend IP configuration of your global load balancer is static and advertised across [most Azure regions](#participating-regions-in-azure).
28
28
29
-
:::image type="content" source="./media/cross-region-overview/cross-region-load-balancer.png" alt-text="Diagram of global load balancer." border="true":::
29
+
:::image type="content" source="./media/cross-region-overview/cross-region-load-balancer.png" alt-text="Screenshot of diagram showing global load balancer architecture." border="true":::
30
30
31
31
> [!NOTE]
32
32
> The backend port of your load balancing rule on global load balancer should match the frontend port of the load balancing rule/inbound nat rule on regional standard load balancer.
@@ -39,7 +39,7 @@ If one region fails, the traffic is routed to the next closest healthy regional
39
39
40
40
The health probe of the global load balancer gathers information about availability of each regional load balancer every 5 seconds. If one regional load balancer drops its availability to 0, global load balancer detects the failure. The regional load balancer is then taken out of rotation.
41
41
42
-
:::image type="content" source="./media/cross-region-overview/global-region-view.png" alt-text="Diagram of global region traffic view." border="true":::
42
+
:::image type="content" source="./media/cross-region-overview/global-region-view.png" alt-text="Screenshot of diagram showing global region traffic view." border="true":::
43
43
44
44
### Ultra-low latency
45
45
@@ -49,8 +49,8 @@ Traffic started from a client hits the closest participating region and travel t
49
49
50
50
For example, you have a global load balancer with standard load balancers in Azure regions:
51
51
52
-
* West US
53
-
* North Europe
52
+
- West US
53
+
- North Europe
54
54
55
55
If a flow is started from Seattle, traffic enters West US. This region is the closest participating region from Seattle. The traffic is routed to the closest region load balancer, which is West US.
56
56
@@ -94,75 +94,75 @@ Add your existing load balancer deployments to a global load balancer for a high
94
94
95
95
### Home regions and participating regions
96
96
97
-
**Home region** is where the global load balancer or Public IP Address of Global tier is deployed.
97
+
--Home region-- is where the global load balancer or Public IP Address of Global tier is deployed.
98
98
This region doesn't affect how the traffic is routed. If a home region goes down, traffic flow is unaffected.
99
99
100
100
#### Home regions in Azure
101
-
* Central US
102
-
* East Asia
103
-
* East US 2
104
-
* North Europe
105
-
* Southeast Asia
106
-
* UK South
107
-
* US Gov Virginia
108
-
* West Europe
109
-
* West US
110
-
* China North 2
101
+
- Central US
102
+
- East Asia
103
+
- East US 2
104
+
- North Europe
105
+
- Southeast Asia
106
+
- UK South
107
+
- US Gov Virginia
108
+
- West Europe
109
+
- West US
110
+
- China North 2
111
111
112
112
> [!NOTE]
113
113
> You can only deploy your global load balancer or Public IP in Global tier in one of the listed Home regions.
114
114
115
-
A **participating region** is where the Global public IP of the load balancer is being advertised.
115
+
A --participating region-- is where the Global public IP of the load balancer is being advertised.
116
116
117
117
Traffic started by the user travels to the closest participating region through the Microsoft core network.
118
118
119
119
Global load balancer routes the traffic to the appropriate regional load balancer.
120
120
121
-
:::image type="content" source="./media/cross-region-overview/multiple-region-global-traffic.png" alt-text="Diagram of multiple region global traffic.":::
121
+
:::image type="content" source="./media/cross-region-overview/multiple-region-global-traffic.png" alt-text="Screenshot of diagram showing multiple region global traffic flow.":::
122
122
123
123
#### Participating regions in Azure
124
124
125
-
* Australia East
126
-
* Australia Southeast
127
-
* Central India
128
-
* Central US
129
-
* East Asia
130
-
* East US
131
-
* East US 2
132
-
* Japan East
133
-
* North Central US
134
-
* North Europe
135
-
* South Central US
136
-
* Southeast Asia
137
-
* UK South
138
-
* US DoD Central
139
-
* US DoD East
140
-
* US Gov Arizona
141
-
* US Gov Texas
142
-
* US Gov Virginia
143
-
* West Central US
144
-
* West Europe
145
-
* West US
146
-
* West US 2
125
+
- Australia East
126
+
- Australia Southeast
127
+
- Central India
128
+
- Central US
129
+
- East Asia
130
+
- East US
131
+
- East US 2
132
+
- Japan East
133
+
- North Central US
134
+
- North Europe
135
+
- South Central US
136
+
- Southeast Asia
137
+
- UK South
138
+
- US DoD Central
139
+
- US DoD East
140
+
- US Gov Arizona
141
+
- US Gov Texas
142
+
- US Gov Virginia
143
+
- West Central US
144
+
- West Europe
145
+
- West US
146
+
- West US 2
147
147
148
148
> [!NOTE]
149
149
> The backend regional load balancers can be deployed in any publicly available Azure Region and isn't limited to just participating regions.
150
150
151
151
## Limitations of global load balancer
152
152
153
-
* Global frontend IP configurations are public only. An internal frontend is currently not supported.
153
+
- Global frontend IP configurations are public only. An internal frontend is currently not supported.
154
154
155
-
* Private or internal load balancer can't be added to the backend pool of a global load balancer
155
+
- Private or internal load balancer can't be added to the backend pool of a global load balancer
156
156
157
-
* NAT64 translation isn't supported at this time. The frontend and backend IPs must be of the same type (v4 or v6).
157
+
- NAT64 translation isn't supported at this time. The frontend and backend IPs must be of the same type (v4 or v6).
158
158
159
-
* UDP traffic on port 3 isn't supported on global load balancer
159
+
- UDP traffic on port 3 isn't supported on global load balancer
160
160
161
-
* Outbound rules aren't supported on global load balancer. For outbound connections, utilize [outbound rules](./outbound-rules.md) on the regional load balancer or [NAT gateway](../nat-gateway/nat-overview.md).
161
+
- Outbound rules aren't supported on global load balancer. For outbound connections, utilize [outbound rules](./outbound-rules.md) on the regional load balancer or [NAT gateway](../nat-gateway/nat-overview.md).
162
162
163
-
* Regional load balancers can't be upgraded to the global tier. Only new load balancers can be created as the global tier.
163
+
- Regional load balancers can't be upgraded to the global tier. Only new load balancers can be created as the global tier.
164
164
165
-
* When placing the same NIC(s) behind multiple regional load balancers with global load balancer, the load balancing rules on each regional load balancer with the same frontend port must also be configured to the same backend port.
165
+
- When placing the same NIC(s) behind multiple regional load balancers with global load balancer, the load balancing rules on each regional load balancer with the same frontend port must also be configured to the same backend port.
166
166
167
167
## Pricing and SLA
168
168
Global load balancer shares the [SLA](https://azure.microsoft.com/support/legal/sla/load-balancer/v1_0/) of standard load balancer.
Copy file name to clipboardExpand all lines: articles/load-balancer/cross-subscription-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: load-balancer
6
6
author: mbender-ms
7
7
ms.service: azure-load-balancer
8
8
ms.topic: overview
9
-
ms.date: 02/20/2025
9
+
ms.date: 01/29/2026
10
10
ms.author: mbender
11
11
ms.custom:
12
12
- sfi-image-nochange
@@ -22,7 +22,7 @@ This article provides an overview of cross-subscription load balancing with Azur
22
22
23
23
Cross-subscription load balancing allows you to deploy Azure Load Balancer resources across multiple subscriptions. This feature enables you to deploy a load balancer in one subscription and have the frontend IP and backend pool instances in a different subscription. This capability is useful for organizations that have separate subscriptions for networking and application resources.
24
24
25
-
:::image type="content" source="media/cross-subscription-load-balancer-overview/cross-subscription-load-balancer-concept.png" alt-text="Diagram of cross-subscription load balancer concepts with two subscriptions and resources.":::
25
+
:::image type="content" source="media/cross-subscription-load-balancer-overview/cross-subscription-load-balancer-concept.png" alt-text="Screenshot of cross-subscription load balancer concepts with two subscriptions and resources.":::
26
26
27
27
This table illustrates some of the possible scenarios cross-subscription load balancing supports.
28
28
@@ -38,7 +38,7 @@ Cross-subscription frontends allow the frontend IP configuration to reside in a
38
38
### Public frontend IP configurations
39
39
Public IP addresses utilized by an Azure Load Balancer can reside in different subscription than the load balancer. If multiple public IP addresses are attached to a load balancer, each IP address can come from a different subscription. For example, if we have a Load Balancer (deployed in subscription C) with two frontend IPs, the first IP address can reside in subscription B and the second IP address can reside in subscription A.
40
40
41
-
:::image type="content" source="media/cross-subscription-load-balancer-overview/public-frontend-ip-configuration-concept.png" alt-text="Diagram of public frontend ip configuration with crosssubscription load balancing.":::
41
+
:::image type="content" source="media/cross-subscription-load-balancer-overview/public-frontend-ip-configuration-concept.png" alt-text="Screenshot of public frontend IP configuration with cross-subscription load balancing.":::
42
42
43
43
An important note is that once a frontend IP configuration is set, its subscription can’t be modified. However, the frontend IP configuration can be updated with a different IP address within the same subscription. For example, if a frontend IP configuration is attached to IP address A in subscription 1, it can be updated to IP address B also in subscription 1.
44
44
Cross-subscription public IP addresses are only supported on the regional tier standard load balancer
@@ -66,7 +66,7 @@ With SyncMode configured as *Manual*, backend pool instances aren't synchronized
66
66
67
67
In addition, cross-subscription load balancing is supported for Azure global Load Balancer. With cross-subscription global load balancer, backend regional load balancers can each be located in different subscriptions. Cross-subscription backends on a global load balancer don't need other parameters or changes to the backend pool.
68
68
69
-
:::image type="content" source="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept-thumbnail.png" alt-text="Diagram of crosssubscription global load balancer concept." lightbox="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept.png":::
69
+
:::image type="content" source="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept-thumbnail.png" alt-text="Screenshot of cross-subscription global load balancer concept." lightbox="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept.png":::
70
70
71
71
> [!NOTE]
72
72
> Cross-subscription frontends aren't supported on Azure global Load Balancer today.
Copy file name to clipboardExpand all lines: articles/load-balancer/howto-load-balancer-imds.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: load-balancer
6
6
author: mbender-ms
7
7
ms.service: azure-load-balancer
8
8
ms.topic: how-to
9
-
ms.date: 06/28/2024
9
+
ms.date: 01/29/2026
10
10
ms.author: mbender
11
11
ms.custom: template-how-to
12
12
# Customer intent: As a cloud operator, I want to retrieve load balancer metadata using the Instance Metadata Service, so that I can analyze network traffic and manage IP configurations for virtual machines effectively.
Copy file name to clipboardExpand all lines: articles/load-balancer/instance-metadata-service-load-balancer.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: load-balancer
6
6
author: mbender-ms
7
7
ms.service: azure-load-balancer
8
8
ms.topic: concept-article
9
-
ms.date: 06/26/2024
9
+
ms.date: 01/29/2026
10
10
ms.author: mbender
11
11
# Customer intent: "As a cloud infrastructure engineer, I want to retrieve load balancer and virtual machine IP information using the Instance Metadata Service, so that I can efficiently manage and troubleshoot my virtual machine instances behind the load balancer."
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-basic-upgrade-guidance.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,14 @@ author: mbender-ms
5
5
ms.service: azure-load-balancer
6
6
ms.author: mbender
7
7
ms.topic: concept-article
8
-
ms.date: 09/30/2024
8
+
ms.date: 01/29/2026
9
9
# Customer intent: As an cloud engineer with Basic Load Balancer services, I need guidance and direction on migrating my workloads off Basic to Standard SKUs
10
10
---
11
11
12
12
# Upgrading from Basic Load Balancer - Guidance
13
13
14
-
>[!Important]
15
-
>On September 30, 2025, Basic Load Balancer was retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer/). If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer as soon as possible. This article will help guide you through the upgrade process.
14
+
>[!IMPORTANT]
15
+
>On September 30, 2025, Basic Load Balancer was retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer/). If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer as soon as possible. This article will help guide you through the upgrade process.
16
16
17
17
In this article, we discuss guidance for upgrading your Basic Load Balancer instances to Standard Load Balancer. Standard Load Balancer is recommended for all production instances and provides many [key differences](#basic-load-balancer-sku-vs-standard-load-balancer-sku) to your infrastructure.
18
18
@@ -64,7 +64,7 @@ Use these PowerShell scripts to help with upgrading from Basic to Standard SKU:
64
64
> [!NOTE]
65
65
> Although manually upgrading your Basic Load Balancer to a Standard Load Balancer using the Portal is an option, we recommend using the [**automated script option**](./upgrade-basic-standard-with-powershell.md) above, due to the number of steps and complexity of the migration. The automation ensures a consistent migration and minimizes downtime to load balanced applications.
66
66
67
-
>[!Warning]
67
+
>[!WARNING]
68
68
> Before manually upgrading a Basic Load Balancer, make sure that all Public IPs associated with both the Load Balancer and its backend Virtual Machines are set to 'static'. If you disassociate a Public IP or remove all backend VMs before changing the IP allocation to static, the IP address may be lost.
69
69
70
70
When manually migrating from a Basic to Standard SKU Load Balancer, there are a couple key considerations to keep in mind:
@@ -79,7 +79,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
79
79
1. Change all Public IPs associated with the Basic Load Balancer and backend Virtual Machines to 'static' allocation
80
80
1. For private Load Balancers, record the private IP addresses allocated to the frontend IP configurations
81
81
1. Record the backend pool membership of the Basic Load Balancer
82
-
1. Record the load balancing rules, NAT rules and health probe configuration of the Basic Load Balancer
82
+
1. Record the load balancing rules, NAT rules, and health probe configuration of the Basic Load Balancer
83
83
1. Create a new Standard SKU Load Balancer, matching the public or private configuration of the Basic Load Balancer. Name the frontend IP configuration something temporary. For public load balancers, use a new Public IP address for the frontend configuration. For guidance, see [Create a Public Load Balancer in the Portal](./quickstart-load-balancer-standard-public-portal.md) or [Create an Internal Load Balancer in the Portal](./quickstart-load-balancer-standard-internal-portal.md)
84
84
1. Duplicate the Basic SKU Load Balancer configuration for the following:
85
85
1. Backend pool names
@@ -91,7 +91,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
91
91
1. For Virtual Machine Scale Set backends, remove the Load Balancer association in the Networking settings and [update the instances](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
92
92
1. Delete the Basic Load Balancer
93
93
> [!NOTE]
94
-
> For Virtual Machine Scale Set backends, you will need to remove the load balancer association in the Networking settings. Once removed, you will also need to [**update the instances**](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
94
+
> For Virtual Machine Scale Set backends, you'll need to remove the load balancer association in the Networking settings. Once removed, you'll also need to [**update the instances**](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
95
95
1.[Upgrade all Public IPs](../virtual-network/ip-services/public-ip-upgrade-portal.md) previously associated with the Basic Load Balancer and backend Virtual Machines to Standard SKU. For Virtual Machine Scale Sets, remove any instance-level public IP configuration, update the instances, then add a new one with Standard SKU and update the instances again.
96
96
1. Recreate the frontend configurations from the Basic Load Balancer on the newly created Standard Load Balancer, using the same public or private IP addresses as on the Basic Load Balancer
97
97
1. Update the load balancing and NAT rules to use the appropriate frontend configurations
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-best-practices.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,12 @@ services: load-balancer
6
6
author: cozhang8
7
7
ms.service: azure-load-balancer
8
8
ms.topic: troubleshooting
9
-
ms.date: 01/13/2025
9
+
ms.date: 01/29/2026
10
10
ms.author: mbender
11
11
# Customer intent: As a cloud architect, I want to implement best practices for deploying and configuring a load balancer, so that I can enhance the reliability and performance of my Azure network infrastructure.
12
12
---
13
13
14
14
# Azure Load Balancer Best Practices
15
-
<!-- Before Publishing: -->
16
-
<!-- Verify TOC entry is added to TOC.yml -->
17
15
18
16
This article discusses a collection of Azure best practices for your load balancer deployment. These best practices are derived from our experience with Azure networking and the experiences of customers like yourself.
0 commit comments