Skip to content

Commit 250e788

Browse files
authored
Merge pull request #221197 from johndowns/front-door-logs
Front Door - Update log documentation
2 parents a871262 + d038a53 commit 250e788

File tree

10 files changed

+489
-405
lines changed

10 files changed

+489
-405
lines changed

articles/frontdoor/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,8 @@
175175
href: private-link.md
176176
- name: Understand billing
177177
href: billing.md
178+
- name: Logs and metrics
179+
href: front-door-diagnostics.md?pivots=front-door-standard-premium
178180
- name: Best practices
179181
href: best-practices.md
180182
- name: Scenarios
@@ -313,11 +315,11 @@
313315
href: standard-premium/how-to-enable-private-link-web-app.md
314316
- name: Azure CLI
315317
href: standard-premium/how-to-enable-private-link-web-app-cli.md
316-
- name: Monitor and Reports
318+
- name: Monitor and reports
317319
items:
318-
- name: Configure diagnostic
320+
- name: Configure diagnostic logs
319321
href: standard-premium/how-to-logs.md
320-
- name: Set up monitoring and alerts
322+
- name: Access metrics and create alerts
321323
href: standard-premium/how-to-monitor-metrics.md
322324
- name: View Front Door reports
323325
href: standard-premium/how-to-reports.md

articles/frontdoor/best-practices.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: johndowns
66
ms.service: frontdoor
77
ms.topic: conceptual
88
ms.workload: infrastructure-services
9-
ms.date: 12/05/2022
9+
ms.date: 02/23/2023
1010
ms.author: jodowns
1111
---
1212

@@ -32,6 +32,12 @@ Front Door's features work best when traffic only flows through Front Door. You
3232

3333
When you work with Front Door by using APIs, ARM templates, Bicep, or Azure SDKs, it's important to use the latest available API or SDK version. API and SDK updates occur when new functionality is available, and also contain important security patches and bug fixes.
3434

35+
### Configure logs
36+
37+
Front Door tracks extensive telemetry about every request. When you enable caching, your origin servers might not receive every request, so it's important that you use the Front Door logs to understand how your solution is running and responding to your clients. For more information about the metrics and logs that Azure Front Door records, see [Monitor metrics and logs in Azure Front Door](front-door-diagnostics.md) and [WAF logs](../web-application-firewall/afds/waf-front-door-monitor.md#waf-logs).
38+
39+
To configure logging for your own application, see [Configure Azure Front Door logs](./standard-premium/how-to-logs.md)
40+
3541
## TLS best practices
3642

3743
### Use end-to-end TLS
@@ -48,7 +54,7 @@ You can configure Front Door to automatically redirect HTTP requests to use the
4854

4955
### Use managed TLS certificates
5056

51-
When Front Door manages your TLS certificates, it reduces your operational costs, and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates managed TLS certificates.
57+
When Front Door manages your TLS certificates, it reduces your operational costs, and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates the managed TLS certificates.
5258

5359
For more information, see [Configure HTTPS on an Azure Front Door custom domain using the Azure portal](standard-premium/how-to-configure-https-custom-domain.md).
5460

@@ -62,7 +68,7 @@ For more information, see [Select the certificate for Azure Front Door to deploy
6268

6369
### Use the same domain name on Front Door and your origin
6470

65-
Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. The feature can also help when you want to avoid configuring custom domain names in Front Door and at your origin. However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
71+
Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. This feature can also help when you want to avoid configuring custom domain names in Front Door and at your origin. However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
6672

6773
Before you rewrite the `Host` header of your requests, carefully consider whether your application is going to work correctly.
6874

@@ -72,7 +78,7 @@ For more information, see [Preserve the original HTTP host name between a revers
7278

7379
### Enable the WAF
7480

75-
For internet-facing applications, we recommend you enable the Front Door web application firewall (WAF) and configure it to use managed rules. When you use a WAF and Microsoft-managed rules, your application is protected from a range of attacks.
81+
For internet-facing applications, we recommend you enable the Front Door web application firewall (WAF) and configure it to use managed rules. When you use a WAF and Microsoft-managed rules, your application is protected from a wide range of attacks.
7682

7783
For more information, see [Web Application Firewall (WAF) on Azure Front Door](web-application-firewall.md).
7884

articles/frontdoor/front-door-caching.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ When you configure caching, you specify how the cache should handle query string
131131

132132
* **Specify cache key query string** behavior to include or exclude specified parameters when the cache key is generated.
133133

134-
For example, suppose that the default cache key is `/foo/image/asset.html`, and a request is made to the URL `https://contoso.com//foo/image/asset.html?language=EN&userid=100&sessionid=200`. If there's a rules engine rule to exclude the `userid` query string parameter, then the query string cache key would be `/foo/image/asset.html?language=EN&sessionid=200`.
134+
For example, suppose that the default cache key is `/foo/image/asset.html`, and a request is made to the URL `https://contoso.com/foo/image/asset.html?language=EN&userid=100&sessionid=200`. If there's a rules engine rule to exclude the `userid` query string parameter, then the query string cache key would be `/foo/image/asset.html?language=EN&sessionid=200`.
135135

136136
Configure the query string behavior on the Front Door route.
137137

@@ -206,11 +206,17 @@ In addition, Front Door attaches the `X-Cache` header to all responses. The `X-C
206206
- `PRIVATE_NOSTORE`: Request can't be cached because the *Cache-Control* response header is set to either *private* or *no-store*.
207207
- `CONFIG_NOCACHE`: Request is configured to not cache in the Front Door profile.
208208

209+
## Logs and reports
210+
209211
::: zone pivot="front-door-standard-premium"
210212

211-
## Logs and reports
213+
The [access log](front-door-diagnostics.md#access-log) includes the cache status for each request. Also, [reports](standard-premium/how-to-reports.md#caching-report) include information about how Azure Front Door's cache is used in your application.
214+
215+
::: zone-end
216+
217+
::: zone pivot="front-door-classic"
212218

213-
The [Front Door Access Log](standard-premium/how-to-logs.md#access-log) includes the cache status for each request. Also, [reports](standard-premium/how-to-reports.md#caching) include information about how Front Door's cache is used in your application.
219+
The [access log](front-door-diagnostics.md#access-log) includes the cache status for each request.
214220

215221
::: zone-end
216222

@@ -222,7 +228,7 @@ Cache behavior and duration can be configured in Rules Engine. Rules Engine cach
222228

223229
* **When caching is disabled**, Azure Front Door doesn’t cache the response contents, irrespective of the origin response directives.
224230

225-
* **When caching is enabled**, the cache behavior differs based on the cache behavior value applied by the Rules Engine:
231+
* **When caching is enabled**, the cache behavior is different depending on the cache behavior value applied by the Rules Engine:
226232

227233
* **Honor origin**: Azure Front Door will always honor origin response header directive. If the origin directive is missing, Azure Front Door will cache contents anywhere from one to three days.
228234
* **Override always**: Azure Front Door will always override with the cache duration, meaning that it will cache the contents for the cache duration ignoring the values from origin response directives. This behavior will only be applied if the response is cacheable.

0 commit comments

Comments
 (0)