You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/reliability/reliability-health-data-services-deidentification.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,12 +19,12 @@ This article describes reliability support in the de-identification service (pre
19
19
20
20
[!INCLUDE [introduction to disaster recovery](includes/reliability-disaster-recovery-description-include.md)]
21
21
22
-
Each de-identification service (preview) is deployed to a single Azure region. In the event of a region-wide degredation or outage:
22
+
Each de-identification service (preview) is deployed to a single Azure region. If an entire region is not available or performance is significantly degraded::
23
23
- ARM control plane functionality is limited to read-only during the outage. Your service metadata (such as resource properties) is always backed up outside of the region by Microsoft. Once the outage is over, you can read and write to the control plane.
24
-
- All data plane requests fail during the outage, such as de-identification or job API requests. No customer data is lost, but there is the potential for job progress metadata to be lost. Once the outage is over, you can read and write to the data plane.
24
+
- All data plane requests fail during the outage, such as de-identification or job API requests. No customer data is lost, but there's the potential for job progress metadata to be lost. Once the outage is over, you can read and write to the data plane.
25
25
26
26
### Disaster recovery tutorial
27
-
If an entire Azure region is not available, you can still assure high availability of your workloads. You can deploy two or more de-identification services in an active-active configuration, with Azure Front door used to route traffic to both regions.
27
+
If an entire Azure region isn't available, you can still assure high availability of your workloads. You can deploy two or more de-identification services in an active-active configuration, with Azure Front door used to route traffic to both regions.
28
28
29
29
With this example architecture:
30
30
@@ -47,7 +47,7 @@ To complete this tutorial:
47
47
48
48
#### Create a resource group
49
49
50
-
You need two instances of a de-identification service (preview) in different Azure regions for this tutorial. The tutorial uses the [region pair](../availability-zones/cross-region-replication-azure.md#azure-paired-regions)East US/West US as your two regions, but feel free to choose your own regions.
50
+
You need two instances of a de-identification service (preview) in different Azure regions for this tutorial. The tutorial uses the East US and West US 2 regions, but feel free to choose your own regions.
51
51
52
52
To make management and clean-up simpler, you use a single resource group for all resources in this tutorial. Consider using separate resource groups for each region/resource to further isolate your resources in a disaster recovery situation.
53
53
@@ -59,7 +59,7 @@ az group create --name my-deid --location eastus
59
59
60
60
#### Create de-identification services (preview)
61
61
62
-
Follow the steps at [Quickstart: Deploy the de-identification service (preview)](/azure/healthcare-apis/deidentification/quickstart) to create two separate services, one in East US and one in West US.
62
+
Follow the steps at [Quickstart: Deploy the de-identification service (preview)](/azure/healthcare-apis/deidentification/quickstart) to create two separate services, one in East US and one in West US 2.
63
63
64
64
Note the service URL of each de-identification service so you can define the backend addresses when you deploy the Azure Front Door in the next step.
|`sku`|`Premium_AzureFrontDoor`|The pricing tier of the Azure Front Door profile. |
89
89
90
90
91
-
### Add an endpoint
91
+
### Add an Azure Front Door endpoint
92
92
93
-
Run [`az afd endpoint create`](/cli/azure/afd/endpoint#az-afd-endpoint-create) to create an endpoint in your profile. You can create multiple endpoints in your profile after finishing the create experience.
93
+
Run [`az afd endpoint create`](/cli/azure/afd/endpoint#az-afd-endpoint-create) to create an endpoint in your Azure Front Door profile. This endpoint routes requests to your services. You can create multiple endpoints in your profile after you finish this guide.
|`endpoint-name`|`myendpoint`|Name of the endpoint under the profile, which is unique globally. |
102
102
|`enabled-state`|`Enabled`|Whether to enable this endpoint. |
103
103
104
-
#### Create an origin group
104
+
#### Create an Azure Front Door origin group
105
105
106
106
Run [`az afd origin-group create`](/cli/azure/afd/origin-group#az-afd-origin-group-create) to create an origin group that contains your two de-identification services.
|`additional-latency-in-milliseconds`|`50`|The extra latency in milliseconds for probes to fall into the lowest latency bucket. |
122
122
|`enable-health-probe`|| Switch to control the status of the health probe. |
123
123
124
-
### Add origins to the group
124
+
### Add origins to the Azure Front Door origin group
125
125
126
126
Run [`az afd origin create`](/cli/azure/afd/origin#az-afd-origin-create) to add an origin to your origin group. For the `--host-name` and `--origin-host-header` parameters, replace the placeholder value `<service-url-east-us>` with your East US service URL, leaving out the scheme (`https://`). You should have a value like `abcdefghijk.api.eastus.deid.azure.com`.
|`enabled-state`|`Enabled`|Whether to enable this origin. |
140
140
|`https-port`|`443`|The port used for HTTPS requests to the origin. |
141
141
142
-
Repeat this step to add your second origin. For the `--host-name` and `--origin-host-header` parameters, replace the placeholder value `<service-url-west-us>` with your West US service URL, leaving out the scheme (`https://`).
142
+
Repeat this step to add your second origin. For the `--host-name` and `--origin-host-header` parameters, replace the placeholder value `<service-url-west-us-2>` with your West US 2 service URL, leaving out the scheme (`https://`).
Pay attention to the `--priority` parameters in both commands. Because both origins are set to priority `1`, Azure Front Door treats both origins as active and direct traffic to both regions. If the priority for one origin is set to `2`, Azure Front Door will treat that origin as secondary and will direct all traffic to the other origin unless it goes down.
148
+
Pay attention to the `--priority` parameters in both commands. Because both origins are set to priority `1`, Azure Front Door treats both origins as active and direct traffic to both regions. If the priority for one origin is set to `2`, Azure Front Door treats that origin as secondary and directs all traffic to the other origin unless it goes down.
149
149
150
-
#### Add a route
150
+
#### Add an Azure Front Door route
151
151
152
152
Run [`az afd route create`](/cli/azure/afd/route#az-afd-route-create) to map your endpoint to the origin group. This route forwards requests from the endpoint to your origin group.
153
153
@@ -181,12 +181,12 @@ To test instant global failover:
181
181
182
182
1. Open a browser and go to the endpoint hostname: `<endpoint>.azurefd.net/health`.
183
183
1. Follow the steps at [Configure private access](/azure/healthcare-apis/deidentification/configure-private-endpoints#configure-private-access) to disable public network access for the de-identification service in East US.
184
-
1. Refresh your browser. You should see the same information page because traffic is now directed to the de-identification service in West US.
184
+
1. Refresh your browser. You should see the same information page because traffic is now directed to the de-identification service in West US 2.
185
185
186
186
> [!TIP]
187
187
> You might need to refresh the page a few times for the failover to complete.
188
188
189
-
1. Now disable public network access for the de-identification service in West US.
189
+
1. Now disable public network access for the de-identification service in West US 2.
190
190
1. Refresh your browser. This time, you should see an error message.
191
191
1. Re-enable public network access for one of the de-identification services. Refresh your browser and you should see the health status again.
192
192
@@ -203,7 +203,7 @@ az group delete --name my-deid
203
203
This command might take a few minutes to complete.
204
204
205
205
#### Initiate recovery
206
-
In the case of disaster, you can check the health status of your de-identification service (preview) by sending requests to `<service-url>/health`.
206
+
To check the recovery status of your service, you can send requests to `<service-url>/health`.
0 commit comments