You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/best-practices.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: johndowns
6
6
ms.service: frontdoor
7
7
ms.topic: conceptual
8
8
ms.workload: infrastructure-services
9
-
ms.date: 12/05/2022
9
+
ms.date: 02/23/2023
10
10
ms.author: jodowns
11
11
---
12
12
@@ -32,6 +32,12 @@ Front Door's features work best when traffic only flows through Front Door. You
32
32
33
33
When you work with Front Door by using APIs, ARM templates, Bicep, or Azure SDKs, it's important to use the latest available API or SDK version. API and SDK updates occur when new functionality is available, and also contain important security patches and bug fixes.
34
34
35
+
### Configure logs
36
+
37
+
Front Door tracks extensive telemetry about every request. When you enable caching, your origin servers might not receive every request, so it's important that you use the Front Door logs to understand how your solution is running and responding to your clients. For more information about the metrics and logs that Azure Front Door records, see [Monitor metrics and logs in Azure Front Door](front-door-diagnostics.md) and [WAF logs](../web-application-firewall/afds/waf-front-door-monitor.md#waf-logs).
38
+
39
+
To configure logging for your own application, see [Configure Azure Front Door logs](./standard-premium/how-to-logs.md)
40
+
35
41
## TLS best practices
36
42
37
43
### Use end-to-end TLS
@@ -48,7 +54,7 @@ You can configure Front Door to automatically redirect HTTP requests to use the
48
54
49
55
### Use managed TLS certificates
50
56
51
-
When Front Door manages your TLS certificates, it reduces your operational costs, and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates managed TLS certificates.
57
+
When Front Door manages your TLS certificates, it reduces your operational costs, and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates the managed TLS certificates.
52
58
53
59
For more information, see [Configure HTTPS on an Azure Front Door custom domain using the Azure portal](standard-premium/how-to-configure-https-custom-domain.md).
54
60
@@ -62,7 +68,7 @@ For more information, see [Select the certificate for Azure Front Door to deploy
62
68
63
69
### Use the same domain name on Front Door and your origin
64
70
65
-
Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. The feature can also help when you want to avoid configuring custom domain names in Front Door and at your origin. However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
71
+
Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. This feature can also help when you want to avoid configuring custom domain names in Front Door and at your origin. However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
66
72
67
73
Before you rewrite the `Host` header of your requests, carefully consider whether your application is going to work correctly.
68
74
@@ -72,7 +78,7 @@ For more information, see [Preserve the original HTTP host name between a revers
72
78
73
79
### Enable the WAF
74
80
75
-
For internet-facing applications, we recommend you enable the Front Door web application firewall (WAF) and configure it to use managed rules. When you use a WAF and Microsoft-managed rules, your application is protected from a range of attacks.
81
+
For internet-facing applications, we recommend you enable the Front Door web application firewall (WAF) and configure it to use managed rules. When you use a WAF and Microsoft-managed rules, your application is protected from a wide range of attacks.
76
82
77
83
For more information, see [Web Application Firewall (WAF) on Azure Front Door](web-application-firewall.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-caching.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ When you configure caching, you specify how the cache should handle query string
131
131
132
132
***Specify cache key query string** behavior to include or exclude specified parameters when the cache key is generated.
133
133
134
-
For example, suppose that the default cache key is `/foo/image/asset.html`, and a request is made to the URL `https://contoso.com//foo/image/asset.html?language=EN&userid=100&sessionid=200`. If there's a rules engine rule to exclude the `userid` query string parameter, then the query string cache key would be `/foo/image/asset.html?language=EN&sessionid=200`.
134
+
For example, suppose that the default cache key is `/foo/image/asset.html`, and a request is made to the URL `https://contoso.com/foo/image/asset.html?language=EN&userid=100&sessionid=200`. If there's a rules engine rule to exclude the `userid` query string parameter, then the query string cache key would be `/foo/image/asset.html?language=EN&sessionid=200`.
135
135
136
136
Configure the query string behavior on the Front Door route.
137
137
@@ -206,11 +206,17 @@ In addition, Front Door attaches the `X-Cache` header to all responses. The `X-C
206
206
-`PRIVATE_NOSTORE`: Request can't be cached because the *Cache-Control* response header is set to either *private* or *no-store*.
207
207
-`CONFIG_NOCACHE`: Request is configured to not cache in the Front Door profile.
208
208
209
+
## Logs and reports
210
+
209
211
::: zone pivot="front-door-standard-premium"
210
212
211
-
## Logs and reports
213
+
The [access log](front-door-diagnostics.md#access-log) includes the cache status for each request. Also, [reports](standard-premium/how-to-reports.md#caching-report) include information about how Azure Front Door's cache is used in your application.
214
+
215
+
::: zone-end
216
+
217
+
::: zone pivot="front-door-classic"
212
218
213
-
The [Front Door Access Log](standard-premium/how-to-logs.md#access-log) includes the cache status for each request. Also, [reports](standard-premium/how-to-reports.md#caching) include information about how Front Door's cache is used in your application.
219
+
The [access log](front-door-diagnostics.md#access-log) includes the cache status for each request.
214
220
215
221
::: zone-end
216
222
@@ -222,7 +228,7 @@ Cache behavior and duration can be configured in Rules Engine. Rules Engine cach
222
228
223
229
***When caching is disabled**, Azure Front Door doesn’t cache the response contents, irrespective of the origin response directives.
224
230
225
-
***When caching is enabled**, the cache behavior differs based on the cache behavior value applied by the Rules Engine:
231
+
***When caching is enabled**, the cache behavior is different depending on the cache behavior value applied by the Rules Engine:
226
232
227
233
***Honor origin**: Azure Front Door will always honor origin response header directive. If the origin directive is missing, Azure Front Door will cache contents anywhere from one to three days.
228
234
***Override always**: Azure Front Door will always override with the cache duration, meaning that it will cache the contents for the cache duration ignoring the values from origin response directives. This behavior will only be applied if the response is cacheable.
0 commit comments