Upgrade a basic load balancer with PowerShell
Important
On September 30, 2025, Basic Load Balancer will be retired. For more information, see the official announcement. If you are currently using Basic Load Balancer, make sure to upgrade to Standard Load Balancer prior to the retirement date.
Azure Standard Load Balancer offers a rich set of functionality and high availability through zone redundancy. To learn more about Load Balancer SKU, see comparison table.
This article introduces a PowerShell module that creates a Standard Load Balancer with the same configuration as the Basic Load Balancer, then associates the Virtual Machine Scale Set or Virtual Machine backend pool members with the new Load Balancer.
For an in-depth walk-through of the upgrade module and process, see the following video:
- 03:06 - Step-by-step
- 32:54 - Recovery
- 40:55 - Advanced Scenarios
- 57:54 - Resources
Upgrade Overview
The PowerShell module performs the following functions:
- Verifies that the provided Basic Load Balancer scenario is supported for upgrade.
- Backs up the Basic Load Balancer and Virtual Machine Scale Set configuration, enabling retry on failure or if errors are encountered.
- For public load balancers, updates the front end public IP addresses to Standard SKU and static assignment
- Upgrades the Basic Load Balancer configuration to a new Standard Load Balancer, ensuring configuration and feature parity.
- Migrates Virtual Machine Scale Set and Virtual Machine backend pool members from the Basic Load Balancer to the Standard Load Balancer.
- Creates and associates a network security group with the Virtual Machine Scale Set or Virtual Machine to ensure load balanced traffic reaches backend pool members. This follows Standard Load Balancer's move to a default-deny network policy.
- Upgrades instance-level Public IP addresses associated with Virtual Machine Scale Set or Virtual Machine instances
- Upgrades Inbound NAT Pools to Inbound NAT Rules for Virtual Machine Scale Set backends, creating a new backend pool for each migrated NAT Pool. Specify
-skipUpgradeNATPoolsToNATRules
to skip this upgrade and use the standalone NAT Pool migration module later for more backend pool options. - Logs the upgrade operation for easy audit and failure recovery.
Warning
Migrating internal Basic Load Balancers where the backend VMs or VMSS instances do not have Public IP Addresses requires additional steps for backend connectivity to the internet. Review How should I configure outbound traffic for my Load Balancer?
Note
If the Virtual Machine Scale Set in the Load Balancer backend pool has Public IP Addresses in its network configuration, the Public IP Addresses associated with each Virtual Machine Scale Set instance will change when they are upgraded to Standard SKU. This is because scale set instance-level Public IP addresses cannot be upgraded, only replaced with a new Standard SKU Public IP. All other Public IP addresses will be retained through the migration.
Note
If the Virtual Machine Scale Set behind the Load Balancer is a Service Fabric Cluster, migration with this script will take more time, is higher risk to your application, and will cause downtime. Review Service Fabric Cluster Load Balancer upgrade guidance for migration options.
Unsupported Scenarios
- Basic Load Balancers with IPv6 frontend IP configurations
- Basic Load Balancers for Azure Kubernetes Services (AKS) clusters
- Basic Load Balancers with a Virtual Machine Scale Set backend pool member where one or more Virtual Machine Scale Set instances have ProtectFromScaleSetActions Instance Protection policies enabled
- Migrating a Basic Load Balancer to an existing Standard Load Balancer
Install the 'AzureBasicLoadBalancerUpgrade' module
Prerequisites
- PowerShell: A supported version of PowerShell version 7 or higher is recommended for use with the AzureBasicLoadBalancerUpgrade module on all platforms including Windows, Linux, and macOS. However, PowerShell 5.1 on Windows is supported.
Module Installation
Install the module from PowerShell Gallery
Install-Module -Name AzureBasicLoadBalancerUpgrade -Scope CurrentUser -Repository PSGallery -Force
Pre- and Post-migration Steps
Pre-migration steps
- Validate support for your scenario
- Plan for application downtime during migration
- Develop inbound and outbound connectivity tests for your traffic
- Plan for instance-level Public IP changes on Virtual Machine Scale Set instances (see note)
- [Recommended] Create Network Security Groups or add security rules to an existing Network Security Group for your backend pool members. Allow the traffic through the Load Balancer along with any other traffic to be explicitly allowed on public Standard SKU resources
- [Recommended] Prepare your outbound connectivity, taking one of the following approaches described in How should I configure outbound traffic for my Load Balancer?
Post-migration steps
- Validate that your migration was successful
- Test inbound application connectivity through the Load Balancer
- Test outbound connectivity from backend pool members to the Internet
- For Public Load Balancers with multiple backend pools, create Outbound Rules for each backend pool
Use the module
Ensure you selected the Basic Load Balancer's subscription ID by running
Select-AzSubscription
.Select-AzSubscription -Subscription <SubscriptionId>
Find the Load Balancer you wish to upgrade. Record its name and resource group name.
Examine the basic module parameters:
- BasicLoadBalancerName [string] Required - This parameter is the name of the existing Basic Load Balancer you would like to upgrade
- ResourceGroupName [string] Required - This parameter is the name of the resource group containing the Basic Load Balancer
- StandardLoadBalancerName [string] Optional - Use this parameter to optionally configure a new name for the Standard Load Balancer. If not specified, the Basic Load Balancer name is reused.
- RecoveryBackupPath [string] Optional - This parameter allows you to specify an alternative path in which to store the Basic Load Balancer ARM template backup file (defaults to the current working directory)
Tip
Additional parameters for advanced and recovery scenarios can be viewed by running
Get-Help Start-AzBasicLoadBalancerUpgrade -Detailed
Run the
Start-AzBasicLoadBalancerUpgrade
command, using the following examples for guidance.
Example: validate a scenario
Validate that a Basic Load Balancer is supported for upgrade
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName> -validateScenarioOnly
Example: upgrade by name
Upgrade a Basic Load Balancer to a Standard Load Balancer with the same name, providing the Basic Load Balancer name and resource group name
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName>
Example: upgrade, change name, and show logs
Upgrade a Basic Load Balancer to a Standard Load Balancer with the specified name displayed in the logged output
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName> -StandardLoadBalancerName <newStandardLBName> -FollowLog
Example: upgrade with alternate backup path
Upgrade a Basic Load Balancer to a Standard Load Balancer with the specified name and store the Basic Load Balancer backup file at the specified path
Start-AzBasicLoadBalancerUpgrade -ResourceGroupName <loadBalancerRGName> -BasicLoadBalancerName <basicLBName> -StandardLoadBalancerName <newStandardLBName> -RecoveryBackupPath C:\BasicLBRecovery
Example: validate completed migration
Validate a completed migration by passing the Basic Load Balancer state file backup and the Standard Load Balancer name
Start-AzBasicLoadBalancerUpgrade -validateCompletedMigration -StandardLoadBalancerName <newStandardLBName> -basicLoadBalancerStatePath C:\RecoveryBackups\State_mybasiclb_rg-basiclbrg_20220912T1740032148.json
Example: migrate multiple, related Load Balancers
Migrate multiple Load Balancers with shared backend members at the same time, usually when an application has an internal and an external Load Balancer
# build array of multiple basic load balancers
$multiLBConfig = @(
@{
'standardLoadBalancerName' = 'myStandardInternalLB01' # specifying the standard load balancer name is optional
'basicLoadBalancer' = (Get-AzLoadBalancer -ResourceGroupName myRG -Name myBasicInternalLB01)
},
@{
'standardLoadBalancerName' = 'myStandardExternalLB02'
'basicLoadBalancer' = (Get-AzLoadBalancer -ResourceGroupName myRG -Name myBasicExternalLB02)
}
)
# pass the array of load balancer configurations to the -MultiLBConfig parameter
Start-AzBasicLoadBalancerUpgrade -MultiLBConfig $multiLBConfig
Example: retry failed virtual machine scale set migration
Retry a failed upgrade for a virtual machine scale set's load balancer (due to error or script termination) by providing the Basic Load Balancer and Virtual Machine Scale Set backup state file
Start-AzBasicLoadBalancerUpgrade -FailedMigrationRetryFilePathLB C:\RecoveryBackups\State_mybasiclb_rg-basiclbrg_20220912T1740032148.json -FailedMigrationRetryFilePathVMSS C:\RecoveryBackups\VMSS_myVMSS_rg-basiclbrg_20220912T1740032148.json
Example: retry failed virtual machine migration
Retry a failed upgrade for a VM load balancer (due to error or script termination) by providing the Basic Load Balancer backup state file
Start-AzBasicLoadBalancerUpgrade -FailedMigrationRetryFilePathLB C:\RecoveryBackups\State_mybasiclb_rg-basiclbrg_20220912T1740032148.json
Common Questions
How can I list the Basic Load Balancers to be migrated in my environment?
One way to get a list of the Basic Load Balancers needing to be migrated in your environment is to use an Azure Resource Graph query. The following query lists all the Basic Load Balancers you have access to view:
Resources
| where type == 'microsoft.network/loadbalancers' and sku.name == 'Basic'
'' We created a complex query which assesses the readiness of each Basic Load Balancer for migration on most of the criteria this module checks during validation. The Resource Graph query can be found in our GitHub project or opened in the Azure Resource Graph Explorer.
Will this migration cause downtime to my application?
Yes, because the Basic Load Balancer needs to be removed before the new Standard Load Balancer can be created, there is downtime to your application. See How long does the Upgrade take?
Will the module migrate my frontend IP address to the new Standard Load Balancer?
Yes, for both public and internal load balancers, the module ensures that front end IP addresses are maintained. For public IPs, the IP is converted to a static IP before migration. For internal front ends, the module attempts to reassign the same IP address freed up when the Basic Load Balancer was deleted. If the private IP isn't available the script fails (see What happens if my upgrade fails mid-migration?).
How long does the Upgrade take?
The upgrade normally takes a few minutes for the script to finish. The following factors may lead to longer upgrade times:
- Complexity of your load balancer configuration
- Number of backend pool members
- Instance count of associated Virtual Machine Scale Sets or Virtual Machines
- Service Fabric Cluster: Upgrades for Service Fabric Clusters take around an hour in testing
Keep the downtime in mind and plan for failover if necessary.
Does the script migrate my backend pool members from my Basic Load Balancer to the newly created Standard Load Balancer?
Yes. The Azure PowerShell script migrates the Virtual Machine Scale Sets and Virtual Machines to the newly created Standard Load Balancer backend pools.
Which load balancer components are migrated?
The script migrates the following from the Basic Load Balancer to the Standard Load Balancer:
Public and Private Load Balancers:
- Health Probes:
- All probes are migrated to the new Standard Load Balancer
- Load balancing rules:
- All load balancing rules are migrated to the new Standard Load Balancer
- Inbound NAT Rules:
- All user-created NAT rules are migrated to the new Standard Load Balancer
- Inbound NAT Pools:
- By default, NAT Pools are upgraded to NAT Rules
- To migrate NAT Pools instead, specify the
-skipUpgradeNATPoolsToNATRules
parameter when upgrading
- Backend pools:
- All backend pools are migrated to the new Standard Load Balancer
- All Virtual Machine Scale Set and Virtual Machine network interfaces and IP configurations are migrated to the new Standard Load Balancer
- If a Virtual Machine Scale Set is using Rolling Upgrade policy, the script will update the Virtual Machine Scale Set upgrade policy to "Manual" during the migration process and revert it back to "Rolling" after the migration is completed.
- Instance-level Public IP addresses
- For both Virtual Machines and Virtual Machine Scale Sets, converts attached Public IPs from Basic to Standard SKU. Note, Scale Set instance Public IPs change during the upgrade; virtual machine IPs don't.
- Tags from the Basic Load Balancer to Standard Load Balancer
Public Load Balancer:
- Public frontend IP configuration
- Converts the public IP to a static IP, if dynamic
- Updates the public IP SKU to Standard, if Basic
- Upgrade all associated public IPs to the new Standard Load Balancer
- Outbound Rules:
- Basic load balancers don't support configured outbound rules. The script creates an outbound rule in the Standard load balancer to preserve the outbound behavior of the Basic load balancer. For more information about outbound rules, see Outbound rules.
- Network security group
- Basic Load Balancer doesn't require a network security group to allow outbound connectivity. In case there's no network security group associated with the Virtual Machine Scale Set, a new network security group is created to preserve the same functionality. This new network security group is associated to the Virtual Machine Scale Set backend pool member network interfaces. It allows the same load balancing rules, ports, and protocols along with preserving outbound connectivity.
Internal Load Balancer:
- Private frontend IP configuration
Note
Network security groups are not configured as part of Internal Load Balancer upgrade. To learn more about NSGs, see Network security groups
How do I migrate when my backend pool members belong to multiple Load Balancers?
In a scenario where your backend pool members are also members of backend pools on another Load Balancer, such as when you have internal and external Load Balancers for the same application, the Basic Load Balancers need to be migrated at the same time. Trying to migrate the Load Balancers one at a time would attempt to mix Basic and Standard SKU resources, which isn't allowed. The migration script supports this by passing multiple Basic Load Balancers into the same script execution using the -MultiLBConfig
parameter.
How do I validate that a migration was successful?
At the end of its execution, the upgrade module performs the following validations, comparing the Basic Load Balancer to the new Standard Load Balancer. In a failed migration, this same operation can be called using the -validateCompletedMigration
and -basicLoadBalancerStatePath
parameters to determine the configuration state of the Standard Load Balancer (if one was created). The log file created during the migration also provides extensive detail on the migration operation and any errors.
- The Standard Load Balancer exists and its SKU is 'Standard'
- The count of front end IP configurations match and that the IP addresses are the same
- The count of backend pools and their memberships matches
- The count of load balancing rules matches
- The count of health probes matches
- The count of inbound NAT rules matches
- The count of inbound NAT pools matches
- External Standard Load Balancers have a configured outbound rule
- External Standard Load Balancer backend pool members have associated Network Security Groups
How should I configure outbound traffic for my Load Balancer?
Standard SKU Load Balancers don't allow default outbound access for their backend pool members. Allowing outbound access to the internet requires more steps.
For external Load Balancers, you can use Outbound Rules to explicitly enable outbound traffic for your pool members. If you have a single backend pool, we automatically configure an Outbound Rule for you during migration; if you have more than one backend pool, you need to manually create your Outbound Rules to specify port allocations.
For internal Load Balancers, Outbound Rules aren't an option because there's no Public IP address to SNAT through. This leaves a couple options to consider:
- NAT Gateway: NAT Gateways are Azure's recommended approach for outbound traffic in most cases. However, NAT Gateways require that the attached subnet has no basic SKU network resources--meaning you need to have migrated all your Load Balancers and Public IP Addresses before you can use them. For this reason, we recommend using a two step approach where you first use one of the following approaches for outbound connectivity, then switch to NAT Gateways once your basic SKU migrations are complete.
- Network Virtual Appliance: Route your traffic through a Network Virtual Appliance, such as an Azure Firewall, which will in turn route your traffic to the internet. This option is ideal if you already have a Network Virtual Appliance configured.
- Secondary External Load Balancer: By adding a secondary external Load Balancer to your backend resources, you can use the external Load Balancer for outbound traffic by configuring outbound rules. If this external Load Balancer doesn't have any load balancing rules, NAT rules, or inbound NAT pools configured, your backend resources remain isolated to your internal network for inbound traffic--see outbound-only load balancer configuration. With this option, the external Load Balancer can be configured before migrating from basic to standard SKU and migrated at the same time as the internal load balancer using using the
-MultiLBConfig
parameter - Public IP Addresses: Lastly, Public IP addresses can be added directly to your Virtual Machines or Virtual Machine Scale Set instances. However, this option isn't recommended due to the extra security surface area and expense of adding Public IP Addresses.
What happens if my upgrade fails mid-migration?
The module is designed to accommodate failures, either due to unhandled errors or unexpected script termination. The failure design is a 'fail forward' approach, where instead of attempting to move back to the Basic Load Balancer, you should correct the issue causing the failure (see the error output or log file), and retry the migration again, specifying the -FailedMigrationRetryFilePathLB <BasicLoadBalancerBackupFilePath> -FailedMigrationRetryFilePathVMSS <VMSSBackupFile>
parameters. For public load balancers, because the Public IP Address SKU is updated to Standard, moving the same IP back to a Basic Load Balancer isn't possible.
Watch a video of the recovery process:
If your failed migration was targeting multiple load balancers at the same time, using the -MultiLBConfig
parameter, recover each Load Balancer individually using the following process:
- Address the cause of the migration failure. Check the log file
Start-AzBasicLoadBalancerUpgrade.log
for details - Remove the new Standard Load Balancer (if created). Depending on which stage of the migration failed, you can have to remove the Standard Load Balancer reference from the Virtual Machine Scale Set, Virtual Machine network interfaces (IP configurations), and/or Health Probes to remove the Standard Load Balancer.
- Locate the Basic Load Balancer state backup file. This file is in the directory where the script was executed, or at the path specified with the
-RecoveryBackupPath
parameter during the failed execution. The file is named:State_<basicLBName>_<basicLBRGName>_<timestamp>.json
- Rerun the migration script, specifying the
-FailedMigrationRetryFilePathLB <BasicLoadBalancerbackupFilePath>
and-FailedMigrationRetryFilePathVMSS <VMSSBackupFile>
(for Virtual Machine Scale set backends) parameters instead of -BasicLoadBalancerName or passing the Basic Load Balancer over the pipeline