Skip to content

Governance Policies Azure Networking Load Balancer

Joshua Davis edited this page Apr 5, 2026 · 2 revisions

Load Balancer

Governance policies for Load Balancer

Domain: azure-networking

Patterns

Name Description
Internal Standard Load Balancer with health probes Standard internal LB with TCP health probes and explicit outbound rules

Anti-Patterns

Description Instead
Do not use Basic Load Balancer for new deployments Always use Standard SKU — Basic is being retired
Do not rely on implicit SNAT for production outbound connectivity Use explicit outbound rules or NAT Gateway for deterministic SNAT

References


Checks (4)

Check Severity Description
AZ-LB-001 Required Deploy Load Balancer with Standard SKU — Basic SKU is being retired
AZ-LB-002 Required Enable TCP reset on idle timeout for all load balancing rules
AZ-LB-003 Recommended Use explicit outbound rules instead of implicit SNAT for outbound connectivity
AZ-LB-004 Recommended Enable diagnostic settings for Load Balancer health probe and SNAT metrics

AZ-LB-001

Deploy Load Balancer with Standard SKU — Basic SKU is being retired

Severity: Required
Rationale: Basic LB lacks zone redundancy, SLA, backend pool flexibility, and will be retired September 2025
Agents: terraform-agent, bicep-agent, cloud-architect

Targets

  • Microsoft.Network/loadBalancers

Companion Resources

Resource Name Purpose
Microsoft.Network/publicIPAddresses pip-lb Standard SKU static for public LB, omit for internal LB
Microsoft.Network/networkSecurityGroups nsg-resource Required for Standard LB backends — no default allow
Microsoft.Network/loadBalancers/outboundRules outbound-rule Explicit outbound if disableOutboundSnat is true
Microsoft.Insights/diagnosticSettings diag-metrics Route metrics to Log Analytics

AZ-LB-002

Enable TCP reset on idle timeout for all load balancing rules

Severity: Required
Rationale: TCP reset on idle prevents half-open connections that cause application errors
Agents: terraform-agent, bicep-agent, cloud-architect

Targets

  • Microsoft.Network/loadBalancers

AZ-LB-003

Use explicit outbound rules instead of implicit SNAT for outbound connectivity

Severity: Recommended
Rationale: Implicit SNAT has port exhaustion risks; explicit outbound rules give control over SNAT ports
Agents: terraform-agent, bicep-agent, cloud-architect

Targets

  • Microsoft.Network/loadBalancers

Companion Resources

Resource Name Purpose
Microsoft.Network/publicIPAddresses pip-outbound Dedicated outbound public IP
Microsoft.Network/natGateways nat-gw Alternative — use NAT Gateway instead of outbound rules

AZ-LB-004

Enable diagnostic settings for Load Balancer health probe and SNAT metrics

Severity: Recommended
Rationale: Monitor backend health, SNAT port utilization, and data path availability
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Network/loadBalancers

Companion Resources

Resource Name Purpose
Microsoft.OperationalInsights/workspaces log-analytics Log Analytics workspace

Home

Getting Started

Stages

Interfaces

Configuration

Agent System

Features

Quality

Help

Governance

Policies — Azure

AI Services

Compute

Data Services

Identity

Management

Messaging

Monitoring

Networking

Security

Storage

Web & App

Policies — Well-Architected

Reliability

Security

Cost Optimization

Operational Excellence

Performance Efficiency

Integration

Anti-Patterns
Standards

Application

IaC

Principles

Transforms

Clone this wiki locally