Skip to content

Commit 5f2c350

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/azure-docs-pr into links6-12
2 parents 3bbc55f + 406d95a commit 5f2c350

File tree

85 files changed

+1005
-49
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+1005
-49
lines changed

articles/container-apps/gpu-serverless-overview.md

Lines changed: 8 additions & 1 deletion

articles/frontdoor/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@
8383
href: front-door-security-headers.md?pivots=front-door-standard-premium
8484
- name: Configure delivery rules
8585
href: standard-premium/front-door-add-rules-cli.md
86+
- name: Rules engine scenarios
87+
href: rules-engine-scenarios.md
8688
- name: Server variables
8789
href: rule-set-server-variables.md
8890
- name: URL rewrite

articles/frontdoor/front-door-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ sections:
155155
Azure Front Door and Azure CDN are two services that provide fast and reliable web delivery for your applications. However, they aren't compatible with each other, because they share the same network of Azure edge sites to deliver content to your users. This shared network causes conflicts between their routing and caching policies. Therefore, you have to choose either Azure Front Door or Azure CDN for your application, depending on your performance and security requirements.
156156
157157
- question: |
158-
Is it possible to configure a Azure Front Door profile/endpoint behind another Front Door profile/endpoint or the other way around?
158+
Is it possible to configure an Azure Front Door profile/endpoint behind another Front Door profile/endpoint or the other way around?
159159
answer: |
160160
The fact that both profiles/endpoints would use the same Azure edge POP to handle incoming requests causes a limitation that prevents you from nesting one Azure Front Door profile/endpoint behind another. This setup would cause routing conflicts and performance issues. Therefore, you should ensure that your Azure Front Door profiles/endpoints are not chained together, if you need to use multiple profiles/endpoints for your applications.
161161
@@ -274,7 +274,7 @@ sections:
274274
- question: |
275275
Do I get billed for the Azure Front Door resources that are disabled?
276276
answer: |
277-
Azure Front Door is a service that provides fast and secure web delivery. It allows you to define how your web traffic is routed and optimized across multiple regions and endpoints. Azure Front Door resources, such as Front Door profiles and routing rules, are only charged when they're enabled. However, web application firewall (WAF) policies and rules are charged regardless of their status. Even if you disable a WAF policy or rule, it still incurs costs for you.
277+
Azure Front Door resources cannot be disabled. They can only be deleted. Variable meters like Data Transfer Out, Data Transfer In and Requests are not charged when there is no traffic but base fee is charged even if there is no traffic. Base fee will be charged till the profile is deleted. For AFD Classic, WAF policies and rules are charged regardless of their status. Even if you disable a WAF policy or rule, it still incurs costs for you.
278278
279279
- name: Caching
280280
questions:

articles/frontdoor/front-door-wildcard-domain.md

Lines changed: 0 additions & 1 deletion
33 KB
53.5 KB
40.8 KB
45.4 KB
87.3 KB
96.1 KB

0 commit comments

Comments
 (0)