You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/instance-metadata-service-load-balancer.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ For more information on how to access the load balancer metadata, see [Use Azure
29
29
30
30
## Troubleshoot common error codes
31
31
32
-
For more information on common error codes and their mitigation methods, see [Troubleshoot common error codes when using IMDS](troubleshoot-load-balancer-imds.md).
32
+
For more information on support and troubleshooting resources, see [Support and troubleshooting for Azure Load Balancer](load-balancer-support-help.md).
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-faqs.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ sections:
115
115
- question: |
116
116
Can I access the frontend of my internal load balancer from the participating backend pool VM?
117
117
answer: |
118
-
No, Azure Load Balancer doesn't support this scenario. To learn more, visit our [troubleshoot page](load-balancer-troubleshoot-backend-traffic.md#cause-4-access-of-the-internal-load-balancer-frontend-from-the-participating-load-balancer-backend-pool-vm).
118
+
No, Azure Load Balancer doesn't support this scenario. To learn more, visit [Support and troubleshooting for Azure Load Balancer](load-balancer-support-help.md).
119
119
120
120
- question: |
121
121
What are best practices with respect to outbound connectivity?
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-outbound-connections.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -160,7 +160,7 @@ Outbound connections can burst. A backend instance can be allocated insufficient
160
160
161
161
For more information about connection pooling with Azure App Service, see [Troubleshooting intermittent outbound connection errors in Azure App Service](../app-service/troubleshoot-intermittent-outbound-connection-errors.md#avoiding-the-problem)
162
162
163
-
New outbound connections to a destination IP fail when port exhaustion occurs. Connections succeed when a port becomes available. This exhaustion occurs when the 64,000 ports from an IP address are spread thin across many backend instances. For guidance on mitigation of SNAT port exhaustion, see the [troubleshooting guide](./troubleshoot-outbound-connection.md).
163
+
New outbound connections to a destination IP fail when port exhaustion occurs. Connections succeed when a port becomes available. This exhaustion occurs when the 64,000 ports from an IP address are spread thin across many backend instances. For guidance on mitigation of SNAT port exhaustion, see [Support and troubleshooting for Azure Load Balancer](./load-balancer-support-help.md).
164
164
165
165
## Port reuse
166
166
For TCP connections, the load balancer uses a single SNAT port for every destination IP and port. For connections to the same destination IP, a single SNAT port can be reused as long as the destination port differs. Reuse isn't possible when there already exists a connection to the same destination IP and port.
@@ -185,7 +185,6 @@ In the example in the following table, a backend instance with private IP 10.0.0
185
185
* Each IP address provides 64,000 ports that can be used for SNAT.
186
186
187
187
* Each port can be used for both TCP and UDP connections to a destination IP address
188
-
189
188
* A UDP SNAT port is needed whether the destination port is unique or not. For every UDP connection to a destination IP, one UDP SNAT port is used.
190
189
191
190
* A TCP SNAT port can be used for multiple connections to the same destination IP provided the destination ports are different.
@@ -198,6 +197,6 @@ In the example in the following table, a backend instance with private IP 10.0.0
198
197
199
198
## Next steps
200
199
201
-
*[Troubleshoot outbound connection failures because of SNAT exhaustion](./troubleshoot-outbound-connection.md)
200
+
*[Support and troubleshooting for Azure Load Balancer](./load-balancer-support-help.md)
202
201
*[Review SNAT metrics](./load-balancer-standard-diagnostics.md#how-do-i-check-my-snat-port-usage-and-allocation) and familiarize yourself with the correct way to filter, split, and view them.
203
202
* Learn how to [migrate your existing outbound connectivity method to NAT gateway](../virtual-network/nat-gateway/tutorial-migrate-outbound-nat.md)
0 commit comments