Skip to content

Commit 981d1d5

Browse files
committed
Maintenance + freshness + Acrolinx + Documentor
1 parent 4680dcb commit 981d1d5

9 files changed

Lines changed: 76 additions & 78 deletions

articles/load-balancer/cross-region-overview.md

Lines changed: 54 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: azure-load-balancer
88
ms.topic: concept-article
9-
ms.date: 02/20/2025
9+
ms.date: 01/29/2026
1010
ms.author: mbender
1111
ms.custom: references_regions
1212
# Customer intent: "As a cloud architect, I want to implement a global load balancer, so that I can ensure high availability and geo-redundancy for applications, optimizing traffic distribution while minimizing latency."
@@ -16,17 +16,17 @@ ms.custom: references_regions
1616

1717
Azure Standard Load Balancer supports global load balancing enabling geo-redundant high availability scenarios such as:
1818

19-
* Incoming traffic originating from multiple regions.
20-
* [Instant global failover](#regional-redundancy) to the next optimal regional deployment.
21-
* Load distribution across regions to the closest Azure region with [ultra-low latency](#ultra-low-latency).
22-
* Ability to [scale up/down](#ability-to-scale-updown-behind-a-single-endpoint) behind a single endpoint.
23-
* Static anycast global IP address
24-
* [Client IP preservation](#client-ip-preservation)
25-
* [Build on existing load balancer](#build-cross-region-solution-on-existing-azure-load-balancer) solution with no learning curve
19+
- Incoming traffic originating from multiple regions.
20+
- [Instant global failover](#regional-redundancy) to the next optimal regional deployment.
21+
- Load distribution across regions to the closest Azure region with [ultra-low latency](#ultra-low-latency).
22+
- Ability to [scale up/down](#ability-to-scale-updown-behind-a-single-endpoint) behind a single endpoint.
23+
- Static anycast global IP address
24+
- [Client IP preservation](#client-ip-preservation)
25+
- [Build on existing load balancer](#build-cross-region-solution-on-existing-azure-load-balancer) solution with no learning curve
2626

2727
The frontend IP configuration of your global load balancer is static and advertised across [most Azure regions](#participating-regions-in-azure).
2828

29-
:::image type="content" source="./media/cross-region-overview/cross-region-load-balancer.png" alt-text="Diagram of global load balancer." border="true":::
29+
:::image type="content" source="./media/cross-region-overview/cross-region-load-balancer.png" alt-text="Screenshot of diagram showing global load balancer architecture." border="true":::
3030

3131
> [!NOTE]
3232
> The backend port of your load balancing rule on global load balancer should match the frontend port of the load balancing rule/inbound nat rule on regional standard load balancer.
@@ -39,7 +39,7 @@ If one region fails, the traffic is routed to the next closest healthy regional
3939

4040
The health probe of the global load balancer gathers information about availability of each regional load balancer every 5 seconds. If one regional load balancer drops its availability to 0, global load balancer detects the failure. The regional load balancer is then taken out of rotation.
4141

42-
:::image type="content" source="./media/cross-region-overview/global-region-view.png" alt-text="Diagram of global region traffic view." border="true":::
42+
:::image type="content" source="./media/cross-region-overview/global-region-view.png" alt-text="Screenshot of diagram showing global region traffic view." border="true":::
4343

4444
### Ultra-low latency
4545

@@ -49,8 +49,8 @@ Traffic started from a client hits the closest participating region and travel t
4949

5050
For example, you have a global load balancer with standard load balancers in Azure regions:
5151

52-
* West US
53-
* North Europe
52+
- West US
53+
- North Europe
5454

5555
If a flow is started from Seattle, traffic enters West US. This region is the closest participating region from Seattle. The traffic is routed to the closest region load balancer, which is West US.
5656

@@ -94,75 +94,75 @@ Add your existing load balancer deployments to a global load balancer for a high
9494

9595
### Home regions and participating regions
9696

97-
**Home region** is where the global load balancer or Public IP Address of Global tier is deployed.
97+
--Home region-- is where the global load balancer or Public IP Address of Global tier is deployed.
9898
This region doesn't affect how the traffic is routed. If a home region goes down, traffic flow is unaffected.
9999

100100
#### Home regions in Azure
101-
* Central US
102-
* East Asia
103-
* East US 2
104-
* North Europe
105-
* Southeast Asia
106-
* UK South
107-
* US Gov Virginia
108-
* West Europe
109-
* West US
110-
* China North 2
101+
- Central US
102+
- East Asia
103+
- East US 2
104+
- North Europe
105+
- Southeast Asia
106+
- UK South
107+
- US Gov Virginia
108+
- West Europe
109+
- West US
110+
- China North 2
111111

112112
> [!NOTE]
113113
> You can only deploy your global load balancer or Public IP in Global tier in one of the listed Home regions.
114114
115-
A **participating region** is where the Global public IP of the load balancer is being advertised.
115+
A --participating region-- is where the Global public IP of the load balancer is being advertised.
116116

117117
Traffic started by the user travels to the closest participating region through the Microsoft core network.
118118

119119
Global load balancer routes the traffic to the appropriate regional load balancer.
120120

121-
:::image type="content" source="./media/cross-region-overview/multiple-region-global-traffic.png" alt-text="Diagram of multiple region global traffic.":::
121+
:::image type="content" source="./media/cross-region-overview/multiple-region-global-traffic.png" alt-text="Screenshot of diagram showing multiple region global traffic flow.":::
122122

123123
#### Participating regions in Azure
124124

125-
* Australia East
126-
* Australia Southeast
127-
* Central India
128-
* Central US
129-
* East Asia
130-
* East US
131-
* East US 2
132-
* Japan East
133-
* North Central US
134-
* North Europe
135-
* South Central US
136-
* Southeast Asia
137-
* UK South
138-
* US DoD Central
139-
* US DoD East
140-
* US Gov Arizona
141-
* US Gov Texas
142-
* US Gov Virginia
143-
* West Central US
144-
* West Europe
145-
* West US
146-
* West US 2
125+
- Australia East
126+
- Australia Southeast
127+
- Central India
128+
- Central US
129+
- East Asia
130+
- East US
131+
- East US 2
132+
- Japan East
133+
- North Central US
134+
- North Europe
135+
- South Central US
136+
- Southeast Asia
137+
- UK South
138+
- US DoD Central
139+
- US DoD East
140+
- US Gov Arizona
141+
- US Gov Texas
142+
- US Gov Virginia
143+
- West Central US
144+
- West Europe
145+
- West US
146+
- West US 2
147147

148148
> [!NOTE]
149149
> The backend regional load balancers can be deployed in any publicly available Azure Region and isn't limited to just participating regions.
150150
151151
## Limitations of global load balancer
152152

153-
* Global frontend IP configurations are public only. An internal frontend is currently not supported.
153+
- Global frontend IP configurations are public only. An internal frontend is currently not supported.
154154

155-
* Private or internal load balancer can't be added to the backend pool of a global load balancer
155+
- Private or internal load balancer can't be added to the backend pool of a global load balancer
156156

157-
* NAT64 translation isn't supported at this time. The frontend and backend IPs must be of the same type (v4 or v6).
157+
- NAT64 translation isn't supported at this time. The frontend and backend IPs must be of the same type (v4 or v6).
158158

159-
* UDP traffic on port 3 isn't supported on global load balancer
159+
- UDP traffic on port 3 isn't supported on global load balancer
160160

161-
* Outbound rules aren't supported on global load balancer. For outbound connections, utilize [outbound rules](./outbound-rules.md) on the regional load balancer or [NAT gateway](../nat-gateway/nat-overview.md).
161+
- Outbound rules aren't supported on global load balancer. For outbound connections, utilize [outbound rules](./outbound-rules.md) on the regional load balancer or [NAT gateway](../nat-gateway/nat-overview.md).
162162

163-
* Regional load balancers can't be upgraded to the global tier. Only new load balancers can be created as the global tier.
163+
- Regional load balancers can't be upgraded to the global tier. Only new load balancers can be created as the global tier.
164164

165-
* When placing the same NIC(s) behind multiple regional load balancers with global load balancer, the load balancing rules on each regional load balancer with the same frontend port must also be configured to the same backend port.
165+
- When placing the same NIC(s) behind multiple regional load balancers with global load balancer, the load balancing rules on each regional load balancer with the same frontend port must also be configured to the same backend port.
166166

167167
## Pricing and SLA
168168
Global load balancer shares the [SLA](https://azure.microsoft.com/support/legal/sla/load-balancer/v1_0/) of standard load balancer.

articles/load-balancer/cross-subscription-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: azure-load-balancer
88
ms.topic: overview
9-
ms.date: 02/20/2025
9+
ms.date: 01/29/2026
1010
ms.author: mbender
1111
ms.custom:
1212
- sfi-image-nochange
@@ -22,7 +22,7 @@ This article provides an overview of cross-subscription load balancing with Azur
2222

2323
Cross-subscription load balancing allows you to deploy Azure Load Balancer resources across multiple subscriptions. This feature enables you to deploy a load balancer in one subscription and have the frontend IP and backend pool instances in a different subscription. This capability is useful for organizations that have separate subscriptions for networking and application resources.
2424

25-
:::image type="content" source="media/cross-subscription-load-balancer-overview/cross-subscription-load-balancer-concept.png" alt-text="Diagram of cross-subscription load balancer concepts with two subscriptions and resources.":::
25+
:::image type="content" source="media/cross-subscription-load-balancer-overview/cross-subscription-load-balancer-concept.png" alt-text="Screenshot of cross-subscription load balancer concepts with two subscriptions and resources.":::
2626

2727
This table illustrates some of the possible scenarios cross-subscription load balancing supports.
2828

@@ -38,7 +38,7 @@ Cross-subscription frontends allow the frontend IP configuration to reside in a
3838
### Public frontend IP configurations
3939
Public IP addresses utilized by an Azure Load Balancer can reside in different subscription than the load balancer. If multiple public IP addresses are attached to a load balancer, each IP address can come from a different subscription. For example, if we have a Load Balancer (deployed in subscription C) with two frontend IPs, the first IP address can reside in subscription B and the second IP address can reside in subscription A.
4040

41-
:::image type="content" source="media/cross-subscription-load-balancer-overview/public-frontend-ip-configuration-concept.png" alt-text="Diagram of public frontend ip configuration with cross subscription load balancing.":::
41+
:::image type="content" source="media/cross-subscription-load-balancer-overview/public-frontend-ip-configuration-concept.png" alt-text="Screenshot of public frontend IP configuration with cross-subscription load balancing.":::
4242

4343
An important note is that once a frontend IP configuration is set, its subscription can’t be modified. However, the frontend IP configuration can be updated with a different IP address within the same subscription. For example, if a frontend IP configuration is attached to IP address A in subscription 1, it can be updated to IP address B also in subscription 1.
4444
Cross-subscription public IP addresses are only supported on the regional tier standard load balancer
@@ -66,7 +66,7 @@ With SyncMode configured as *Manual*, backend pool instances aren't synchronized
6666

6767
In addition, cross-subscription load balancing is supported for Azure global Load Balancer. With cross-subscription global load balancer, backend regional load balancers can each be located in different subscriptions. Cross-subscription backends on a global load balancer don't need other parameters or changes to the backend pool.
6868

69-
:::image type="content" source="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept-thumbnail.png" alt-text="Diagram of cross subscription global load balancer concept." lightbox="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept.png":::
69+
:::image type="content" source="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept-thumbnail.png" alt-text="Screenshot of cross-subscription global load balancer concept." lightbox="media/cross-subscription-load-balancer-overview/global-load-balancer-cross-subscription-concept.png":::
7070

7171
> [!NOTE]
7272
> Cross-subscription frontends aren't supported on Azure global Load Balancer today.

articles/load-balancer/howto-load-balancer-imds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: azure-load-balancer
88
ms.topic: how-to
9-
ms.date: 06/28/2024
9+
ms.date: 01/29/2026
1010
ms.author: mbender
1111
ms.custom: template-how-to
1212
# Customer intent: As a cloud operator, I want to retrieve load balancer metadata using the Instance Metadata Service, so that I can analyze network traffic and manage IP configurations for virtual machines effectively.

articles/load-balancer/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: mbender-ms
1212
ms.author: mbender
13-
ms.date: 11/11/2024
13+
ms.date: 01/28/2026
1414
ms.custom: engagement-fy23, seo-FY24Q2
1515

1616
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new

articles/load-balancer/instance-metadata-service-load-balancer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: load-balancer
66
author: mbender-ms
77
ms.service: azure-load-balancer
88
ms.topic: concept-article
9-
ms.date: 06/26/2024
9+
ms.date: 01/29/2026
1010
ms.author: mbender
1111
# Customer intent: "As a cloud infrastructure engineer, I want to retrieve load balancer and virtual machine IP information using the Instance Metadata Service, so that I can efficiently manage and troubleshoot my virtual machine instances behind the load balancer."
1212
---

articles/load-balancer/load-balancer-basic-upgrade-guidance.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ author: mbender-ms
55
ms.service: azure-load-balancer
66
ms.author: mbender
77
ms.topic: concept-article
8-
ms.date: 09/30/2024
8+
ms.date: 01/29/2026
99
# Customer intent: As an cloud engineer with Basic Load Balancer services, I need guidance and direction on migrating my workloads off Basic to Standard SKUs
1010
---
1111

1212
# Upgrading from Basic Load Balancer - Guidance
1313

14-
>[!Important]
15-
>On September 30, 2025, Basic Load Balancer was retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer/). If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer as soon as possible. This article will help guide you through the upgrade process.
14+
> [!IMPORTANT]
15+
> On September 30, 2025, Basic Load Balancer was retired. For more information, see the [official announcement](https://azure.microsoft.com/updates/azure-basic-load-balancer-will-be-retired-on-30-september-2025-upgrade-to-standard-load-balancer/). If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer as soon as possible. This article will help guide you through the upgrade process.
1616
1717
In this article, we discuss guidance for upgrading your Basic Load Balancer instances to Standard Load Balancer. Standard Load Balancer is recommended for all production instances and provides many [key differences](#basic-load-balancer-sku-vs-standard-load-balancer-sku) to your infrastructure.
1818

@@ -64,7 +64,7 @@ Use these PowerShell scripts to help with upgrading from Basic to Standard SKU:
6464
> [!NOTE]
6565
> Although manually upgrading your Basic Load Balancer to a Standard Load Balancer using the Portal is an option, we recommend using the [**automated script option**](./upgrade-basic-standard-with-powershell.md) above, due to the number of steps and complexity of the migration. The automation ensures a consistent migration and minimizes downtime to load balanced applications.
6666
67-
>[!Warning]
67+
> [!WARNING]
6868
> Before manually upgrading a Basic Load Balancer, make sure that all Public IPs associated with both the Load Balancer and its backend Virtual Machines are set to 'static'. If you disassociate a Public IP or remove all backend VMs before changing the IP allocation to static, the IP address may be lost.
6969
7070
When manually migrating from a Basic to Standard SKU Load Balancer, there are a couple key considerations to keep in mind:
@@ -79,7 +79,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
7979
1. Change all Public IPs associated with the Basic Load Balancer and backend Virtual Machines to 'static' allocation
8080
1. For private Load Balancers, record the private IP addresses allocated to the frontend IP configurations
8181
1. Record the backend pool membership of the Basic Load Balancer
82-
1. Record the load balancing rules, NAT rules and health probe configuration of the Basic Load Balancer
82+
1. Record the load balancing rules, NAT rules, and health probe configuration of the Basic Load Balancer
8383
1. Create a new Standard SKU Load Balancer, matching the public or private configuration of the Basic Load Balancer. Name the frontend IP configuration something temporary. For public load balancers, use a new Public IP address for the frontend configuration. For guidance, see [Create a Public Load Balancer in the Portal](./quickstart-load-balancer-standard-public-portal.md) or [Create an Internal Load Balancer in the Portal](./quickstart-load-balancer-standard-internal-portal.md)
8484
1. Duplicate the Basic SKU Load Balancer configuration for the following:
8585
1. Backend pool names
@@ -91,7 +91,7 @@ Suggested order of operations for manually upgrading a Basic Load Balancer in co
9191
1. For Virtual Machine Scale Set backends, remove the Load Balancer association in the Networking settings and [update the instances](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
9292
1. Delete the Basic Load Balancer
9393
> [!NOTE]
94-
> For Virtual Machine Scale Set backends, you will need to remove the load balancer association in the Networking settings. Once removed, you will also need to [**update the instances**](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
94+
> For Virtual Machine Scale Set backends, you'll need to remove the load balancer association in the Networking settings. Once removed, you'll also need to [**update the instances**](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-perform-manual-upgrades)
9595
1. [Upgrade all Public IPs](../virtual-network/ip-services/public-ip-upgrade-portal.md) previously associated with the Basic Load Balancer and backend Virtual Machines to Standard SKU. For Virtual Machine Scale Sets, remove any instance-level public IP configuration, update the instances, then add a new one with Standard SKU and update the instances again.
9696
1. Recreate the frontend configurations from the Basic Load Balancer on the newly created Standard Load Balancer, using the same public or private IP addresses as on the Basic Load Balancer
9797
1. Update the load balancing and NAT rules to use the appropriate frontend configurations

articles/load-balancer/load-balancer-best-practices.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,12 @@ services: load-balancer
66
author: cozhang8
77
ms.service: azure-load-balancer
88
ms.topic: troubleshooting
9-
ms.date: 01/13/2025
9+
ms.date: 01/29/2026
1010
ms.author: mbender
1111
# Customer intent: As a cloud architect, I want to implement best practices for deploying and configuring a load balancer, so that I can enhance the reliability and performance of my Azure network infrastructure.
1212
---
1313

1414
# Azure Load Balancer Best Practices
15-
<!-- Before Publishing: -->
16-
<!-- Verify TOC entry is added to TOC.yml -->
1715

1816
This article discusses a collection of Azure best practices for your load balancer deployment. These best practices are derived from our experience with Azure networking and the experiences of customers like yourself.
1917

0 commit comments

Comments
 (0)