All posts
Written by Sujith Quintelier Sep 24, 2025

Azure Load Balancing: Choose the Right Option

Explore Azure load balancing options and optimize traffic distribution for scalable, high-performance, and highly available cloud applications.
Sep 24, 2025

What is Load Balancing?

Load balancing is the even distribution of network traffic across a group of backend computing resources or servers. The primary goals of load balancing are:

Optimizing resource utilization
Maximizing throughput & performance
Minimizing response time
Ensuring high availability
Preventing overload on a single resource

In Azure, there are multiple load-balancing options, each designed for different traffic types and use cases.


TL;DR (2025 Update)

GoalPickWhyLayer / Scope
Global HTTP(S) acceleration + WAFFront Door Std/PremiumAnycast edge, caching, rapid failoverL7 / Global
Global single anycast IP for TCP/UDPCross-region Load BalancerL4 pass-through, fast failover (no DNS TTL)L4 / Global
Hybrid or external endpoint steeringTraffic ManagerDNS-based latency / geo / weighted policiesDNS / Global
In-region advanced HTTP routing + per-app WAFApplication Gateway v2Path/host routing, rewrites, mTLSL7 / Regional
Regional TCP/UDP balancing + outbound SNATStandard Load BalancerHigh-perf, zone redundantL4 / Regional
Insert firewall / IDS transparentlyGateway Load BalancerInline NVA chaining without UDR complexityL3/L4 / Regional
Legacy Basic LB still presentMigrate to StandardBasic retires 30 Sept 20251

Plan outbound explicitly before default outbound access retirement (30 Sept 2025)2. Combine services (e.g. Front Door + App Gateway) for layered designs.


🔍 Azure Load Balancing Options (2025 Update)

The Azure portfolio has evolved since this article was first published. Notable changes:

  • Basic Load Balancer retires 30 Sept 2025 (no new Basic deployments after 31 Mar 2025).
  • Standard Load Balancer now supports a cross-region (global) tier.
  • Gateway Load Balancer enables transparent NVA insertion.
  • Azure Front Door has Standard and Premium tiers (Classic is legacy).
ServiceScopeRecommended ForClassification
Standard Load BalancerRegional & Global (cross-region)Non-HTTP(S) TCP/UDP, high-performance L4, outbound SNATLayer 4 (data plane)
Traffic ManagerGlobal (DNS)Latency / geo / weighted / priority routing; hybrid endpointsDNS-based traffic steering (not an inline proxy)
Application Gateway (v2)RegionalAdvanced HTTP(S) app delivery, WAF, mTLS, rewritesLayer 7 proxy
Azure Front Door (Std/Premium)GlobalGlobal web apps & APIs, acceleration, WAF, rules engineLayer 7 anycast edge
Gateway Load BalancerRegional (inline)Transparent insertion of NVAs (firewall, IDS/IPS, DPI)Layer 3/4 service chaining
(Legacy) Basic Load BalancerRegionalLegacy workloads only (migrate)Retiring 30 Sept 2025
Load Balancing Decision Tree
Load Balancing Decision Tree

Now, let’s explore each of these services in detail.


🌍 Azure Load Balancer (Standard)

Azure Load Balancer
Azure Load Balancer

Standard Azure Load Balancer is a Layer 4 (TCP/UDP) load-balancing service designed for high-performance and ultra-low-latency traffic. It distributes inbound and outbound flows and is zone redundant. A cross-region (global) Load Balancer SKU3 lets you expose a single anycast IP fronting multiple regional Standard Load Balancers for active-active or fast failover scenarios.

Retirement Notice: Basic Load Balancer retires on 30 Sept 20251. Migrate to Standard for: security by default (closed unless NSG permits), higher scale, zone redundancy, SLA (99.99%), HA ports, and global tier integration.

Types of Azure Load Balancers

TypePurpose
Public Load BalancerDistributes internet-facing traffic across VMs in a VNet.
Internal Load BalancerDistributes private network traffic within Azure.
ALB Public vs Internal
ALB Public vs Internal

Availability Zone Configurations

ModeBehavior
Zone RedundantUses a single IP, surviving zone failures.
ZonalRestricts traffic to a specific zone.
ALB Zone Redundant
ALB Zone Redundant

Standard vs. (Retiring) Basic Load Balancer

FeatureStandardBasic (Legacy)
Backend pool sizeUp to 1000 instances300 instances
Health probesTCP, HTTP, HTTPSTCP, HTTP
Security postureClosed by default (NSG allow required)Open to internet by default
HA Ports (all ports)✅ Supported❌ Not supported
Zonal / Zone redundant✅ Yes❌ No
Cross-region (global tier)✅ Yes❌ No
SLA99.99% (≥2 healthy instances)None
Retirement statusActiveRetires 30 Sept 2025

Action: Audit for any Basic SKUs (including Basic Public IP) and plan upgrade before the retirement cutoff1.

Cross-region (Global) Load Balancer

Provides a globally anycast IPv4 frontend distributing traffic to a backend pool of regional public Standard Load Balancers. Use it when you need:

  • Fast failover without DNS TTL delays (contrast with Traffic Manager).
  • A single global IP for multi-region L4 workloads (TCP/UDP).
  • Simpler active-active pattern for stateful protocols (hash-based distribution per flow).

Not a replacement for Front Door (no HTTP features) nor Traffic Manager (which can include non-Azure endpoints & complex routing policies).

Outbound Connectivity (Retirement Note)

Default outbound access for VMs retires 30 Sept 20252. Plan explicit outbound via:

  1. NAT Gateway
  2. Standard Load Balancer outbound rules (frontend IPs)
  3. Instance-level public IP (least preferred for fleets)

Prefer NAT Gateway for high SNAT scale; LB outbound fits when you already require inbound load balancing.


🌐 Azure Traffic Manager (DNS-based Routing)

Azure Traffic Manager
Azure Traffic Manager

Traffic Manager is a DNS-based global traffic steering service4. It does not proxy or terminate connections; it returns the best endpoint (based on the chosen routing method) to the client resolver. Because of DNS caching, failover is influenced by TTL and client resolver behaviour.

How It Works

1️⃣ A client requests a domain (e.g., app.contoso.com).
2️⃣ The DNS system redirects to contoso.trafficmanager.net.
3️⃣ Traffic Manager selects a backend using health checks & routing rules.
4️⃣ The client receives the IP of the closest, available backend and connects directly.

Azure Traffic Manager Setup
Azure Traffic Manager Setup

Routing Methods

Routing MethodUse Case
PriorityPrimary backend with failover options.
WeightedDistribute traffic based on weights.
PerformanceRoute traffic to the closest backend.
GeographicRoute traffic based on user location.
MultiValueReturn multiple healthy endpoints.
SubnetRoute based on user IP ranges.
Traffic Manager Routing
Traffic Manager Routing

Traffic Manager is ideal for:
✔️ Latency-based routing where DNS steering is sufficient
✔️ Hybrid / external endpoints (on-prem, other clouds)
✔️ Controlled weighted canary rollouts
✔️ Geographic compliance routing (data sovereignty)


🔹 Azure Application Gateway (v2)

Azure Application Gateway
Azure Application Gateway

Application Gateway is a Layer 7 load balancer designed specifically for HTTP(S) traffic5. It provides advanced web traffic routing, SSL offloading, and Web Application Firewall (WAF) integration.

Key Features (v2 SKU)

Path- & host-based routing
Session affinity (cookie-based)
TLS termination & end-to-end TLS
Mutual TLS (client cert auth)
Web Application Firewall (WAF) (Prevention / Detection modes)
HTTP/2, WebSockets
Header & URL rewrite rules
Autoscaling & zone redundancy
Custom error pages & diagnostics (Access logs, Performance logs)

Application Gateway Flow
Application Gateway Flow

Best for:
✔️ Web applications that require advanced traffic routing.
✔️ Security-conscious deployments using WAF protection.


🌎 Azure Front Door (Standard/Premium)

Azure Front Door
Azure Front Door

Azure Front Door is a global anycast Layer 7 application delivery network6 offering dynamic site acceleration, intelligent routing, and integrated security.

Key Capabilities

Global HTTP(S) load balancing & fast failover
Dynamic & static content acceleration (edge POP caching)
Rules Engine (headers, redirects, rewrites)
Custom domains & managed certificates
Integrated WAF (Core Rule Set), DDoS edge protection
Private origin support (Premium) via Private Link
Advanced security features (Premium): Bot protection, more granular WAF features
Near real-time health probes & rapid failover (vs DNS TTL delays)

💡 Front Door vs. Traffic Manager:

  • Front Door: Inline HTTP(S) proxy, real-time health & latency-based routing, edge caching, WAF.
  • Traffic Manager: DNS answer steering only; no caching, TLS, or header logic; supports non-HTTP endpoints & external origins.

Best for:
✔️ Global applications that need low latency.
✔️ Web APIs requiring intelligent traffic routing.


🌍 Global vs. Regional & Layer Considerations

ServiceScopePrimary Layer / ModeTypical Use Case
Cross-region (Global) Load BalancerGlobalL4 TCP/UDP pass-throughSingle global IP for multi-region backend L4 workloads
Standard Load Balancer (Regional)RegionalL4 TCP/UDPIntra-region distribution & outbound SNAT
Azure Front Door (Std/Premium)GlobalL7 HTTP(S) proxyGlobal web/API acceleration & security
Traffic ManagerGlobal (DNS)DNS steeringLatency / geo / weighted routing incl. external endpoints
Application Gateway (v2)RegionalL7 HTTP(S) proxyRegional web app delivery & WAF with VNet integration
Gateway Load BalancerRegional (inline)Service chaining (L3/L4)Transparent NVA insertion (firewall, IDS/IPS)

Selection Cheat Sheet

ScenarioRecommendedNotes
Global low-latency web/API + caching + WAFFront Door PremiumAdd App Gateway if per-app internal segmentation needed
Multi-region L4 (non-HTTP) with single IPCross-region Load BalancerBackend pool = regional Standard LBs
DNS-based hybrid (on-prem & Azure)Traffic ManagerCombine with Front Door or regional LBs
In-region advanced routing & WAFApplication GatewayCan sit behind Front Door
Insert firewall / NVA transparentlyGateway Load Balancer (+ Standard LB)Chaining simplifies flow symmetry
Legacy Basic LB deploymentMigrate to Standard LBPlan before retirement date

Common Combinations

  • Front Door + Application Gateway: Global entry + regional path-based routing & WAF policies separation.
  • Front Door + Standard Load Balancer: Global HTTP(S) to edge; regional L4 services or container ingress.
  • Cross-region Load Balancer + Traffic Manager: Rare—Traffic Manager as external fallback or hybrid integration.
  • Gateway Load Balancer + Standard Public LB + Front Door: Full chain: edge (FD) → security NVA (GLB) → application tier.
  • Traffic Manager + Front Door: Layered control for regulatory geo mapping with Front Door acceleration.

📌 Final Thoughts

Azure offers multiple load balancing solutions, each designed for specific traffic types, regions, and use cases. Whether you’re building a global web application or optimizing regional traffic, choosing the right service is key to maximizing performance, availability, and security.

💡 Summary (2025):
✔️ Use Front Door (Std/Premium) for global HTTP(S) acceleration & security.
✔️ Use Cross-region Load Balancer for global L4 with a single anycast IP.
✔️ Use Traffic Manager for DNS-based steering & hybrid endpoints.
✔️ Use Application Gateway (v2) for regional L7 with WAF & rewrites.
✔️ Use Standard Load Balancer for regional L4 + outbound SNAT.
✔️ Use Gateway Load Balancer to insert NVAs transparently.
✔️ Migrate any Basic SKUs before 30 Sept 2025.



  1. Azure Basic Load Balancer retirement announcement: Official notice ↩︎ ↩︎ ↩︎

  2. Default outbound access retirement: Announcement ↩︎ ↩︎

  3. Cross-region (Global) Load Balancer overview: Docs ↩︎

  4. Load balancing options & architecture guidance: Docs ↩︎

  5. Azure Application Gateway overview: Docs ↩︎

  6. Azure Front Door overview: Docs ↩︎

Sponsored by GitAds