Skip to content

Commit 43c3f77

Browse files
authored
Merge pull request #284434 from duongau/afdfreshness
Azure Front Door - freshness review batch 1 - 8/12
2 parents e66d9bf + a705ddd commit 43c3f77

File tree

5 files changed

+63
-64
lines changed

5 files changed

+63
-64
lines changed

articles/frontdoor/front-door-custom-domain.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: frontdoor
55
author: duongau
66
ms.service: azure-frontdoor
77
ms.topic: how-to
8-
ms.date: 04/04/2023
8+
ms.date: 08/12/2024
99
ms.author: duau
1010
#Customer intent: As a website owner, I want to add a custom domain to my Front Door configuration so that my users can use my custom domain to access my content.
1111
---
@@ -40,7 +40,7 @@ A custom domain can only be associated with one Front Door profile at a time. Ho
4040

4141
## Map the temporary afdverify subdomain
4242

43-
When you map an existing domain that is in production, there are things consider. While you're registering your custom domain in the Azure portal, a brief period of downtime for the domain may occur. To avoid interruption of web traffic, map your custom domain to your Front Door default frontend host with the Azure afdverify subdomain first to create a temporary CNAME mapping. Your users can access your domain without interruption when the DNS mapping occurs.
43+
When you map an existing domain that is in production, there are things consider. While you're registering your custom domain in the Azure portal, a brief period of downtime for the domain might occur. To avoid interruption of web traffic, map your custom domain to your Front Door default frontend host with the Azure afdverify subdomain first to create a temporary CNAME mapping. Your users can access your domain without interruption when the DNS mapping occurs.
4444

4545
If you're using your custom domain for the first time with no production traffic, you can directly map your custom domain to your Front Door. You can skip ahead to [Map the permanent custom domain](#map-the-permanent-custom-domain).
4646

@@ -50,7 +50,7 @@ To create a CNAME record with the afdverify subdomain:
5050

5151
2. Find the page for managing DNS records by consulting the provider's documentation or searching for areas of the web site labeled **Domain Name**, **DNS**, or **Name server management**.
5252

53-
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names may vary):
53+
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names might vary):
5454

5555
| Source | Type | Destination |
5656
|---------------------------|-------|---------------------------------|
@@ -78,7 +78,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
7878

7979
- Type: Leave *CNAME* selected.
8080

81-
- Host: Enter the subdomain of your custom domain to use, including the afdverify subdomain name. For example, afdverify.www.
81+
- Host: Enter the subdomain of your custom domain for use, including the afdverify subdomain name. For example, afdverify.www.
8282

8383
- Points to: Enter the host name of your default Front Door frontend host, including the afdverify subdomain name. For example, afdverify.contoso-frontend.azurefd.net.
8484

@@ -91,7 +91,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
9191

9292
## Associate the custom domain with your Front Door
9393

94-
After you've registered your custom domain, you can then add it to your Front Door.
94+
After you register your custom domain, you can then add it to your Front Door.
9595

9696
1. Sign in to the [Azure portal](https://portal.azure.com/) and browse to the Front Door containing the frontend host that you want to map to a custom domain.
9797

@@ -112,22 +112,22 @@ After you've registered your custom domain, you can then add it to your Front Do
112112
113113
## Verify the custom domain
114114

115-
After you've completed the registration of your custom domain, verify that the custom domain references your default Front Door frontend host.
115+
After you complete the registration of your custom domain, verify that the custom domain references your default Front Door frontend host.
116116

117117
In your browser, navigate to the address of the file by using the custom domain. For example, if your custom domain is robotics.contoso.com, the URL to the cached file should be similar to the following URL: http:\//robotics.contoso.com/my-public-container/my-file.jpg. Verify that the result is that same as when you access the Front Door directly at *<Front Door host>*.azurefd.net.
118118

119119

120120
## Map the permanent custom domain
121121

122-
If you've verified that the afdverify subdomain has been successfully mapped to your Front Door, you can then map the custom domain directly to your default Front Door frontend host.
122+
To proceed with mapping the custom domain directly to your default Front Door frontend host, you need to ensure that the afdverify subdomain was successfully mapped to your Front Door. Once verified, you can proceed with mapping the custom domain.
123123

124124
To create a CNAME record for your custom domain:
125125

126126
1. Sign in to the web site of the domain provider for your custom domain.
127127

128128
2. Find the page for managing DNS records by consulting the provider's documentation or searching for areas of the web site labeled **Domain Name**, **DNS**, or **Name Server Management**.
129129

130-
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names may vary):
130+
3. Create a CNAME record entry for your custom domain and complete the fields as shown in the following table (field names might vary):
131131

132132
| Source | Type | Destination |
133133
|-----------------|-------|-----------------------|
@@ -141,7 +141,7 @@ To create a CNAME record for your custom domain:
141141

142142
4. Save your changes.
143143

144-
5. If you're previously created a temporary afdverify subdomain CNAME record, delete it.
144+
5. If you previously created a temporary afdverify subdomain CNAME record, delete it.
145145

146146
6. If you're using this custom domain in production for the first time, follow the steps for [Associate the custom domain with your Front Door](#associate-the-custom-domain-with-your-front-door) and [Verify the custom domain](#verify-the-custom-domain).
147147

@@ -177,7 +177,7 @@ For example, the procedure for the GoDaddy domain registrar is as follows:
177177

178178
In the preceding steps, you added a custom domain to a Front Door. If you no longer want to associate your Front Door with a custom domain, you can remove the custom domain by doing these steps:
179179

180-
1. Go to your DNS provider, delete the CNAME record for the custom domain or update the CNAME record for the custom domain to a non Front Door endpoint.
180+
1. Go to your DNS provider, delete the CNAME record for the custom domain, or update the CNAME record for the custom domain to a non Front Door endpoint.
181181

182182
> [!Important]
183183
> To prevent dangling DNS entries and the security risks they create, starting from April 9th 2021, Azure Front Door requires removal of the CNAME records to Front Door endpoints before the resources can be deleted. Resources include Front Door custom domains, Front Door endpoints or Azure resource groups that has Front Door custom domain(s) enabled.

articles/frontdoor/front-door-routing-architecture.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: front-door
66
author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: conceptual
9-
ms.date: 04/04/2023
9+
ms.date: 08/12/2024
1010
ms.author: duau
1111
zone_pivot_groups: front-door-tiers
1212
---
@@ -55,23 +55,23 @@ When Front Door receives an HTTP request, it uses the request's `Host` header to
5555

5656
::: zone-end
5757

58-
The client and server perform a TLS handshake using the TLS certificate you've configured for your custom domain name, or by using the Front Door certificate when the `Host` header ends with `*.azurefd.net`.
58+
The client and server perform a TLS handshake using the TLS certificate you configured for your custom domain name, or by using the Front Door certificate when the `Host` header ends with `*.azurefd.net`.
5959

6060
## Evaluate WAF rules
6161

6262
::: zone pivot="front-door-standard-premium"
6363

64-
If your domain has enabled the Web Application Firewall, WAF rules are evaluated.
64+
If your domain has Web Application Firewall enabled, WAF rules are evaluated.
6565

6666
::: zone-end
6767

6868
::: zone pivot="front-door-classic"
6969

70-
If your frontend has enabled the Web Application Firewall, WAF rules are evaluated.
70+
If your frontend has Web Application Firewall enabled, WAF rules are evaluated.
7171

7272
::: zone-end
7373

74-
If a rule has been violated, Front Door returns an error to the client and the request processing stops.
74+
If a rule gets violated, Front Door returns an error to the client and the request processing stops.
7575

7676
::: zone pivot="front-door-standard-premium"
7777

@@ -97,15 +97,15 @@ The route specifies the [backend pool](front-door-backend-pool.md) that the requ
9797

9898
## Evaluate rule sets
9999

100-
If you have defined [rule sets](front-door-rules-engine.md) for the route, they're executed in the order they're configured. [Rule sets can override the origin group](front-door-rules-engine-actions.md#RouteConfigurationOverride) specified in a route. Rule sets can also trigger a redirection response to the request instead of forwarding it to an origin.
100+
If you define [rule sets](front-door-rules-engine.md) for the route, they get process in the order configured. [Rule sets can override the origin group](front-door-rules-engine-actions.md#RouteConfigurationOverride) specified in a route. Rule sets can also trigger a redirection response to the request instead of forwarding it to an origin.
101101

102102
::: zone-end
103103

104104
::: zone pivot="front-door-classic"
105105

106106
## Evaluate rules engines
107107

108-
If you have defined [rules engines](front-door-rules-engine.md) for the route, they're executed in the order they're configured. [Rules engines can override the backend pool](front-door-rules-engine-actions.md#route-configuration-overrides) specified in a routing rule. Rules engines can also trigger a redirection response to the request instead of forwarding it to a backend.
108+
If you define [rules engines](front-door-rules-engine.md) for the route, they get process in the order configured. [Rules engines can override the backend pool](front-door-rules-engine-actions.md#route-configuration-overrides) specified in a routing rule. Rules engines can also trigger a redirection response to the request instead of forwarding it to a backend.
109109

110110
::: zone-end
111111

@@ -133,11 +133,11 @@ If caching is disabled or no response is available, the request is forwarded to
133133

134134
Front Door selects an origin to use within the origin group. Origin selection is based on several factors, including:
135135

136-
- The health of each origin, which Front Door monitors by using [health probes](front-door-health-probes.md).
137-
- The [routing method](front-door-routing-methods.md) for your origin group.
138-
- Whether you have enabled [session affinity](front-door-routing-methods.md#affinity)
136+
- Health of each origin, which Front Door monitors by using [health probes](front-door-health-probes.md).
137+
- [Routing method](front-door-routing-methods.md) for your origin group.
138+
- If you enable [session affinity](front-door-routing-methods.md#affinity)
139139

140-
## Forward request to origin
140+
## Forward the request to the origin
141141

142142
Finally, the request is forwarded to the origin.
143143

@@ -149,11 +149,11 @@ Finally, the request is forwarded to the origin.
149149

150150
Front Door selects a backend to use within the backend pool. Backend selection is based on several factors, including:
151151

152-
- The health of each backend, which Front Door monitors by using [health probes](front-door-health-probes.md).
153-
- The [routing method](front-door-routing-methods.md) for your backend pool.
154-
- Whether you have enabled [session affinity](front-door-routing-methods.md#affinity)
152+
- Health of each backend, which Front Door monitors by using [health probes](front-door-health-probes.md).
153+
- [Routing method](front-door-routing-methods.md) for your backend pool.
154+
- If you have enable [session affinity](front-door-routing-methods.md#affinity)
155155

156-
## Forward request to backend
156+
## Forward the request to the backend
157157

158158
Finally, the request is forwarded to the backend.
159159

@@ -163,12 +163,12 @@ Finally, the request is forwarded to the backend.
163163

164164
::: zone pivot="front-door-standard-premium"
165165

166-
- Learn how to [create a Front Door profile](standard-premium/create-front-door-portal.md).
166+
- Learn how to [create an Azure Front Door profile](standard-premium/create-front-door-portal.md).
167167

168168
::: zone-end
169169

170170
::: zone pivot="front-door-classic"
171171

172-
- Learn how to [create a Front Door profile](quickstart-create-front-door.md).
172+
- Learn how to [create an Azure Front Door (classic) profile](quickstart-create-front-door.md).
173173

174174
::: zone-end

0 commit comments

Comments
 (0)