Skip to content

Commit 04df1b9

Browse files
Merge pull request #301014 from MicrosoftDocs/main
Merged by Learn.Build PR Management system
2 parents 44469d9 + c55b499 commit 04df1b9

File tree

5 files changed

+106
-60
lines changed

5 files changed

+106
-60
lines changed

articles/communication-services/quickstarts/tpe/teams-phone-extensibility-quickstart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This article describes how an independent software vendor (ISV) can provision Te
2727
- ISV is using the .NET ACS Call Automation SDK version 1.5.0-beta.1
2828
- ISV is using the JavaScript ACS Call Automation SDK version 1.5.0-beta.2
2929
- ISV is using the JavaScript ACS Client SDK version 1.36.1-beta.1
30-
- You allowlisted the ISV’s Azure subscription in Microsoft Teams.
30+
3131

3232
## Quick start
3333

-29.8 KB
Loading
9.49 KB
Loading

articles/frontdoor/private-link.md

Lines changed: 29 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -26,25 +26,29 @@ Azure Front Door Premium can connect to your origin using Private Link. Your ori
2626

2727
When you enable Private Link to your origin in Azure Front Door Premium, Front Door creates a private endpoint on your behalf from an Azure Front Door managed regional private network. You receive an Azure Front Door private endpoint request at the origin pending your approval.
2828

29-
> [!IMPORTANT]
30-
> You must approve the private endpoint connection before traffic can pass to the origin privately. You can approve private endpoint connections by using the Azure portal, Azure CLI, or Azure PowerShell. For more information, see [Manage a Private Endpoint connection](../private-link/manage-private-endpoint.md).
31-
> Azure Front Door doesn't allow mixing public and private origins in the same origin group.
29+
You must approve the private endpoint connection before traffic can pass to the origin privately. You can approve private endpoint connections by using the Azure portal, Azure CLI, or Azure PowerShell. For more information, see [Manage a Private Endpoint connection](../private-link/manage-private-endpoint.md).
3230

3331
After you enable an origin for Private Link and approve the private endpoint connection, it can take a few minutes for the connection to be established. During this time, requests to the origin receives an Azure Front Door error message. The error message goes away once the connection is established.
3432

35-
Once your request is approved, a private IP address gets assigned from the Azure Front Door managed virtual network. Traffic between your Azure Front Door and your origin communicates using the established private link over the Microsoft backbone network. Incoming traffic to your origin is now secured when arriving at your Azure Front Door.
33+
Once your request is approved, a dedicated private endpoint gets assigned for routing your traffic from the Azure Front Door managed virtual network. Traffic from your clients will reach Azure Front Door Global POPs and is then routed over the Microsoft backbone network to the AFD regional cluster which hosts the managed virtual network containing the dedicated private endpoint. The traffic is then routed to your origin via the private link platform over Microsoft backbone network. Hence the incoming traffic to your origin secured upon the moment it arrives to Azure Front Door.
34+
35+
> [!NOTE]
36+
> * This feature only supports private link connectivity from your AFD to your origin. Client to AFD private connectivity is not supported.
3637
3738
## Supported origins
3839

39-
Origin support for direct private endpoint connectivity is currently limited to:
40-
* Blob Storage
41-
* App Service (Web App, Function App)
42-
* Internal load balancers, or any services that expose internal load balancers such as Azure Kubernetes Service, Azure Container Apps or Azure Red Hat OpenShift
43-
* Storage Static Website
44-
* API Management
45-
* Application Gateway
46-
* Azure Container Apps
47-
40+
Origin support for direct private endpoint connectivity is currently limited to the below origin types.
41+
42+
| Origin type | Documentation |
43+
|--|--|
44+
| App Service (Web App, Function App) | [Connect AFD to a Web App / Function App origin with Private Link](standard-premium/how-to-enable-private-link-web-app.md). |
45+
| Blob Storage | [Connect AFD to a storage account origin with Private Link](standard-premium/how-to-enable-private-link-storage-account.md). |
46+
| Storage Static Website | [Connect AFD to a storage static website origin with Private Link](how-to-enable-private-link-storage-static-website.md). |
47+
| Internal load balancers, or any services that expose internal load balancers such as Azure Kubernetes Service, or Azure Red Hat OpenShift | [Connect AFD to an internal load balancer origin with Private Link](standard-premium/how-to-enable-private-link-internal-load-balancer.md). |
48+
| API Management | [Connect AFD to an API Management origin with Private Link](standard-premium/how-to-enable-private-link-apim.md). |
49+
| Application Gateway | [Connect AFD to an application gateway origin with Private Link](how-to-enable-private-link-application-gateway.md). |
50+
| Azure Container Apps | [Connect AFD to an Azure Container Apps origin with Private Link](../container-apps/how-to-integrate-with-azure-front-door.md). |
51+
4852
> [!NOTE]
4953
> * This feature isn't supported with Azure App Service Slots and Azure Static Web App.
5054
@@ -68,11 +72,20 @@ Azure Front Door private link is available in the following regions:
6872

6973
The Azure Front Door Private Link feature is region agnostic but for the best latency, you should always pick an Azure region closest to your origin when choosing to enable Azure Front Door Private Link endpoint. If your origin's region is not supported in the list of regions AFD Private Link supports, pick the next nearest region. You can use [Azure network round-trip latency statistics](../networking/azure-network-latency.md) to determine the next nearest region in terms of latency.
7074

75+
## Tips while using AFD Private Link integration
76+
* Azure Front Door doesn't allow mixing public and private origins in the same origin group. Doing so can cause errors during configuration or while AFD tries to send traffic to the public/private origins. Keep all your public origins in a single origin group and keep all your private origins in a different origin group.
77+
* Improving redundancy:
78+
* To improve redundancy at origin level, make sure you have multiple private link enabled origins within the same origin group so that AFD can distribute traffic across multiple instances of the application. If one instance is unavailable, then other origins can still receive traffic.
79+
* To route Private Link traffic, requests are routed from AFD POPs to the AFD managed virtual network hosted in AFD regional clusters. To have redundancy in case the regional cluster is not reachable, it is recommended to configure multiple origins (each with a different Private Link region) under the same AFD origin group. This way even if one regional cluster is unavailable, then other origins can still receive traffic via a different regional cluster. Below is how an origin group with both origin level and region level redundancy would look like.
80+
:::image type="content" source="./media/private-link/redundant-origin-group.png" alt-text="Diagram showing an origin group with both origin level and region level redundancy.":::
81+
* While approving the private endpoint connection or after approving the private endpoint connection, if you double click on the private endpoint, you will see an error message saying "You don't have access. Copy the error details and send them to your administrator(s) to get access to this page." This is expected as the private endpoint is hosted within a subscription managed by Azure Front Door.
82+
* For platform protection, each AFD regional cluster has a limit of 7200 RPS (requests per second) per AFD profile. Requests beyond 7200 RPS will be rate limited with "429 Too Many Requests". If you are onboarding or expecting traffic more than 7200 RPS, we recommend deploying multiple origins (each with a different Private Link region) so that traffic is spread across multiple AFD regional clusters. It is recommended that each origin is a separate instance of your application to improve origin level redundancy. But if you can not maintain separate instances, you can still configure multiple origins at AFD level with each origin pointing to the same hostname but the regions are kept different. This way AFD will route the traffic to the same instance but via different regional clusters.
83+
7184
## Association of a private endpoint with an Azure Front Door profile
7285

7386
### Private endpoint creation
7487

75-
Within a single Azure Front Door profile, if two or more Private Link enabled origins are created with the same set of resource ID, group ID and region, then for all such origins only one private endpoint gets created. Connections to the backend can be enabled using this private endpoint. This setup means you only have to approve the private endpoint once because only one private endpoint gets created. If you create more Private Link enabled origins using the same set of Private Link location, resource ID, and group ID, you don't need to approve anymore private endpoints.
88+
Within a single Azure Front Door profile, if two or more Private Link enabled origins are created with the same set of resource ID, group ID and region, then for all such origins only one private endpoint gets created. Connections to the backend can be enabled using this private endpoint. This setup means you only have to approve the private endpoint once because only one private endpoint gets created. If you create more Private Link enabled origins using the same set of Private Link location, resource ID, and group ID, you don't need to approve any more private endpoints.
7689

7790
#### Single private endpoint
7891

@@ -84,20 +97,14 @@ For example, a single private endpoint gets created for all the different origin
8497

8598
A new private endpoint gets created in the following scenario:
8699

87-
* If the region, resource ID or group ID changes:
100+
* If the region, resource ID or group ID changes, AFD considers that the Private Link location and the hostname has changed, resulting in extra private endpoints created and each one needs to be approved.
88101

89102
:::image type="content" source="./media/private-link/multiple-endpoints.png" alt-text="Diagram showing a multiple private endpoint created because changes in the region and resource ID for the origin.":::
90103

91-
> [!NOTE]
92-
> The Private Link location and the hostname has changed, resulting in extra private endpoints created and requires approval for each one.
93-
94-
* When the Azure Front Door profile changes:
104+
* Enabling Private Link for origins in different Front Door profiles will create extra private endpoints and requires approval for each one.
95105

96106
:::image type="content" source="./media/private-link/multiple-profiles.png" alt-text="Diagram showing a multiple private endpoint created because the origin is associated with multiple Azure Front Door profiles.":::
97107

98-
> [!NOTE]
99-
> Enabling Private Link for origins in different Front Door profiles will create extra private endpoints and requires approval for each one.
100-
101108
### Private endpoint removal
102109

103110
When an Azure Front Door profile gets deleted, private endpoints associated with the profile also get deleted.

0 commit comments

Comments
 (0)