Hello Nick ,
Thanks for reaching pout to Microsoft Q and A Forum,
Standard Load Balancers are secure by default:
- All inbound and outbound traffic is denied unless explicitly allowed via Network Security Groups (NSGs).
- Unlike Basic Load Balancers, Standard ones do not allow traffic automatically.
Steps to Fix It
- Check and Update NSGs
- Go to the Network Security Group associated with:
- The subnet or
- The NIC of your VMs
- Ensure inbound rules exist for:
- TCP 80/443 (for websites)
- TCP 3389 (for RDP)
- Also ensure outbound rules allow internet access if needed.
- TCP 80/443 (for websites)
- The subnet or
- Verify Load Balancer Rules
- Go to the Standard Load Balancer in the Azure Portal.
- Check:
- Frontend IP configuration (should be Standard SKU and static)
- Load balancing rules (for web traffic)
- Inbound NAT rules (for RDP access to individual VMs)
- Load balancing rules (for web traffic)
- Frontend IP configuration (should be Standard SKU and static)
- Health Probes
- Ensure health probes are correctly configured and that your VMs are responding to them.
- If probes fail, the Load Balancer will not forward traffic to those VMs.
- Public IP Configuration
- If your VMs had instance-level public IPs, they may have changed or been removed during the upgrade.
- You may need to:
- Reassign static public IPs
- Or use NAT rules on the Load Balancer for access
- Reassign static public IPs
References
[1] Troubleshoot common problems with Azure Load Balancer
[2] AzLoadBalancerMigration/AzureBasicLoadBalancerUpgrade/README.md at main ...
I hope these steps really helped you with the resolution if so, please do accept the answer,
if not do get back to us with more questions.