Skip to content

Commit 499464b

Browse files
authored
Merge pull request #294849 from AbdullahBell/frontdoor-image-removal
Networking: FrontDoor: Reducing screenshot usage:
2 parents 631bab9 + d155335 commit 499464b

File tree

137 files changed

+52
-257
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+52
-257
lines changed

articles/frontdoor/blue-green-deployment.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,6 @@ Azure Front Door is Microsoft's modern cloud Content Delivery Network (CDN) that
4242

4343
1. Select **+ Add a route** to configure routing to your Web App origin.
4444

45-
:::image type="content" source="./media/blue-green-deployment/endpoint.png" alt-text="Screenshot of adding a new endpoint for a new Azure Front Door profile.":::
46-
4745
1. Provide a name for the route and configure the route settings based on the needs of your application. For more information, see [Create a Front Door for your application](create-front-door-portal.md#create-a-front-door-for-your-application).
4846

4947
:::image type="content" source="./media/blue-green-deployment/add-a-route.png" alt-text="Screenshot of the added route page for a new Azure Front Door profile.":::
@@ -65,8 +63,6 @@ Azure Front Door is Microsoft's modern cloud Content Delivery Network (CDN) that
6563

6664
1. Select **+ Add** to add another origin to the origin group. Enter the following information for the new version of the application:
6765

68-
:::image type="content" source="./media/blue-green-deployment/add-new-origin.png" alt-text="Screenshot of adding the second origin in an origin group for a new Azure Front Door profile.":::
69-
7066
| Settings | Values |
7167
|--|--|
7268
| Name | Enter `NewWebApp`. |
@@ -88,8 +84,6 @@ Azure Front Door is Microsoft's modern cloud Content Delivery Network (CDN) that
8884

8985
1. Under **Load balancing settings**, enter the following information:
9086

91-
:::image type="content" source="./media/blue-green-deployment/configure-origin-group-settings.png" alt-text="Screenshot of configuring the origin group settings.":::
92-
9387
| Settings | Values |
9488
|--|--|
9589
| Sample size | Enter `4`. |

articles/frontdoor/classic-retirement-faq.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,8 +96,6 @@ If you have a support plan and you need technical assistance, you can create a [
9696
* *Summary*, describe the problem you’re experiencing with the migration.
9797
* *Problem type*, select **Migrating Front Door Classic to Front Door Standard or Premium**
9898

99-
:::image type="content" source="./media/classic-retirement-faq/support-request.png" alt-text="Screenshot of a new support request for Azure Front Door (classic) migration issue.":::
100-
10199
## Next steps
102100

103101
- Migrate from Azure Front Door (classic) to Standard or Premium tier using the [Azure portal](migrate-tier.md) or [Azure PowerShell](migrate-tier-powershell.md)

articles/frontdoor/create-front-door-portal.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -115,16 +115,10 @@ In this step, you configure Azure Front Door to route user traffic to the neares
115115

116116
1. From the home page or the Azure menu, select **+ Create a resource**, search for *Front Door and CDN profiles*, and select **Create**.
117117

118-
:::image type="content" source="./media/create-front-door-portal/front-door-custom-create-secret.png" alt-text="Screenshot of add a secret in custom create.":::
119-
120118
1. In the *Endpoint* tab, select **Add an endpoint**, enter a globally unique name (for example, contoso-frontend), and select **Add**. You can create more endpoints after the initial deployment.
121119

122-
:::image type="content" source="./media/create-front-door-portal/front-door-custom-create-add-endpoint.png" alt-text="Screenshot of add an endpoint.":::
123-
124120
1. To configure routing to your Web App origin, select **+ Add a route**.
125121

126-
:::image type="content" source="./media/create-front-door-portal/add-route.png" alt-text="Screenshot of add a route from the endpoint page." lightbox="./media/create-front-door-portal/add-route-expanded.png":::
127-
128122
1. On the **Add a route** page, enter or select the following information and then select **Add** to add the route to the endpoint configuration.
129123

130124
:::image type="content" source="./media/create-front-door-portal/add-route-page.png" alt-text="Screenshot of add a route configuration page." lightbox="./media/create-front-door-portal/add-route-page-expanded.png":::
@@ -144,12 +138,8 @@ In this step, you configure Azure Front Door to route user traffic to the neares
144138

145139
1. Select **+ Add a policy** to apply a Web Application Firewall (WAF) policy to one or more domains in the Azure Front Door profile.
146140

147-
:::image type="content" source="./media/create-front-door-portal/add-policy.png" alt-text="Screenshot of add a policy from endpoint page." lightbox="./media/create-front-door-portal/add-policy-expanded.png":::
148-
149141
1. To create a security policy, provide a name that uniquely identifies it. Next, choose the domains that you want to apply the policy to. You can also select an existing WAF policy or create a new one. To finish, select **Save** to add the security policy to the endpoint configuration.
150142

151-
:::image type="content" source="./media/create-front-door-portal/add-security-policy.png" alt-text="Screenshot of add security policy page.":::
152-
153143
1. To deploy the Azure Front Door profile, select **Review + Create** and then **Create**. The configuration propagates to all edge locations within a few minutes.
154144

155145
---

articles/frontdoor/front-door-how-to-onboard-apex-domain.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -57,12 +57,8 @@ You can use the Azure portal to onboard an apex domain on your Azure Front Door
5757

5858
1. Select the **Pending** validation state. A new pane appears with the DNS TXT record information needed to validate the custom domain. The TXT record is in the form of `_dnsauth.<your_subdomain>`.
5959

60-
:::image type="content" source="./media/front-door-apex-domain/pending-validation.png" alt-text="Screenshot that shows the custom domain Pending validation.":::
61-
6260
- **Azure DNS-based zone**: Select **Add** to create a new TXT record with the value that appears in the Azure DNS zone.
6361

64-
:::image type="content" source="./media/front-door-apex-domain/validate-custom-domain.png" alt-text="Screenshot that shows validating a new custom domain.":::
65-
6662
- If you're using another DNS provider, manually create a new TXT record with the name `_dnsauth.<your_subdomain>` with the record value as shown on the pane.
6763

6864
1. Close the **Validate the custom domain** pane and return to the **Domains** pane for the Azure Front Door profile. You should see **Validation state** change from **Pending** to **Approved**. If not, wait up to 10 minutes for changes to appear. If your validation doesn't get approved, make sure your TXT record is correct and that name servers are configured correctly if you're using Azure DNS.
@@ -75,14 +71,10 @@ You can use the Azure portal to onboard an apex domain on your Azure Front Door
7571

7672
1. On the **Associate endpoint and route** pane, select the endpoint and route to which you want to associate the domain. Then select **Associate**.
7773

78-
:::image type="content" source="./media/front-door-apex-domain/associate-endpoint.png" alt-text="Screenshot that shows the associated endpoint and route pane for a domain.":::
79-
8074
1. Under the **DNS state** column, select **CNAME record is currently not detected** to add the alias record to the DNS provider.
8175

8276
- **Azure DNS**: Select **Add**.
8377

84-
:::image type="content" source="./media/front-door-apex-domain/cname-record.png" alt-text="Screenshot that shows the Add or update the CNAME record pane.":::
85-
8678
- **A DNS provider that supports CNAME flattening**: You must manually enter the alias record name.
8779

8880
1. After the alias record gets created and the custom domain is associated with the Azure Front Door endpoint, traffic starts flowing.
@@ -115,8 +107,6 @@ Follow the guidance for [configuring HTTPS for your custom domain](standard-prem
115107

116108
1. Select **OK** to submit your changes.
117109

118-
:::image type="content" source="./media/front-door-apex-domain/front-door-apex-alias-record.png" alt-text="Screenshot that shows an alias record for zone apex.":::
119-
120110
1. The preceding step creates a zone apex record that points to your Azure Front Door resource. It also creates a CNAME record mapping **afdverify** (for example, `afdverify.contosonews.com`) that's used for onboarding the domain on your Azure Front Door profile.
121111

122112
## Onboard the custom domain on your Azure Front Door
@@ -129,8 +119,6 @@ Follow the guidance for [configuring HTTPS for your custom domain](standard-prem
129119

130120
1. Select **Save** to submit the changes.
131121

132-
:::image type="content" source="./media/front-door-apex-domain/front-door-onboard-apex-domain.png" alt-text="Screenshot that shows the Add a custom domain pane.":::
133-
134122
## Enable HTTPS on your custom domain
135123

136124
1. Select the custom domain that was added. Under the section **Custom domain HTTPS**, change the status to **Enabled**.

articles/frontdoor/front-door-how-to-redirect-https.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,6 @@ This guide explains how to redirect traffic from HTTP to HTTPS for an Azure Fron
2828

2929
3. Select the **+** icon under *Routing rules* to create a new route. Name the route, for example, **HttpToHttpsRedirect**, and set the *Accepted Protocol* to **HTTP only**. Choose the *Frontend/domains* you want to redirect from HTTP to HTTPS.
3030

31-
:::image type="content" source="./media/front-door-url-redirect/front-door-designer-routing-rule.png" alt-text="Screenshot of adding a route in Front Door designer.":::
32-
3331
4. In the *Route Details* section, set the *Route Type* to **Redirect**. Choose **Moved (301)** for *Redirect type* and **HTTPS only** for *Redirect protocol*.
3432

3533
:::image type="content" source="./media/front-door-url-redirect/front-door-redirect-config-example.png" alt-text="Screenshot of adding an HTTP to HTTPS redirect route.":::

articles/frontdoor/front-door-security-headers.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,6 @@ In this tutorial, you will learn how to:
3232

3333
1. In your Azure Front Door resource, go to **Settings** and select **Rules engine configuration**. Choose the rules engine where you want to add the security header.
3434

35-
:::image type="content" source="media/front-door-security-headers/front-door-rules-engine-configuration.png" alt-text="Screenshot showing rules engine configuration page of Azure Front Door.":::
36-
3735
2. Click **Add rule** to create a new rule. Name the rule and then select **Add an Action** > **Response Header**.
3836

3937
3. Set the Operator to **Append** to add this header to all incoming requests for this route.
@@ -56,8 +54,6 @@ In this tutorial, you will learn how to:
5654

5755
If you no longer need the security header rule configured in the previous steps, you can remove it. To do this, go to the rules engine in your Azure Front Door resource and select **Delete rule**.
5856

59-
:::image type="content" source="./media/front-door-security-headers/front-door-delete-security-header.png" alt-text="Screenshot showing how to delete the security rule.":::
60-
6157
## Next steps
6258

6359
To learn how to configure a Web Application Firewall for your Azure Front Door, proceed to the next tutorial.

articles/frontdoor/front-door-tutorial-rules-engine.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@ In this tutorial, you learn how to:
2929

3030
1. Within your Azure Front Door (classic) resource, select **Rule Engine configuration** from under *Settings* on the left side menu pane. Select **+ Add**, give your configuration a name, and start creating your first Rules Engine configuration.
3131

32-
:::image type="content" source="./media/front-door-rules-engine/rules-engine-tutorial-1.png" alt-text="Screenshot of the rules engine configuration from the Azure Front Door overview page.":::
33-
3432
1. Enter a name for your first rule. Then select **+ Add condition** or **+ Add action** to define your rule.
3533

3634
> [!NOTE]
@@ -40,8 +38,6 @@ In this tutorial, you learn how to:
4038
> - All paths in the rules engine configuration are case sensitive.
4139
> - Header names should adhere to [RFC 7230](https://datatracker.ietf.org/doc/html/rfc7230#section-3.2.6).
4240
43-
:::image type="content" source="./media/front-door-rules-engine/rules-engine-tutorial-4.png" alt-text="Screenshot of the rules engine configuration page with a single rule.":::
44-
4541
1. Determine the priority of the rules within your configuration by using the Move up, Move down, and Move to top buttons. The priority is in ascending order, meaning the rule first listed is the most important rule.
4642

4743
> [!TIP]
@@ -106,12 +102,8 @@ To remove the Rules Engine configuration from your Front Door (classic):
106102
107103
1. Disassociate any routing rules from the rule engine configuration by selecting the three dots next to the rule engine name and selecting **Associate routing rule**:
108104
109-
:::image type="content" source="./media/front-door-rules-engine/front-door-rule-engine-routing-association.png" alt-text="Screenshot of the associate routing rules from the menu.":::
110-
111105
1. Uncheck all routing rules associated with this Rule Engine configuration and select **Save**:
112106
113-
:::image type="content" source="./media/front-door-rules-engine/front-door-routing-rule-association.png" alt-text="Routing rule association":::
114-
115107
1. Delete the Rule Engine configuration from your Front Door:
116108
117109
:::image type="content" source="./media/front-door-rules-engine/front-door-delete-rule-engine-configuration.png" alt-text="Delete Rule Engine configuration":::

articles/frontdoor/how-to-configure-caching.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,6 @@ Caching can significantly decrease latency and reduce the load on origin servers
3030
1. Sign in to the [Azure portal](https://portal.azure.com?azure-portal=true) and navigate to your Azure Front Door profile.
3131

3232
1. Select **Front Door manager** and then select your route.
33-
34-
:::image type="content" source="./media/how-to-configure-caching/select-route.png" alt-text="Screenshot of endpoint landing page.":::
3533

3634
1. Select **Enable caching**.
3735

0 commit comments

Comments
 (0)