Skip to content

Commit 63c49fe

Browse files
committed
added rest of covid recommendations
1 parent ba92989 commit 63c49fe

File tree

1 file changed

+26
-0
lines changed

1 file changed

+26
-0
lines changed

articles/application-gateway/application-gateway-covid-guidelines.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,29 @@ Assuming you have a v2 SKU Application Gateway, setting the maximum instance cou
2323

2424
## Set your minimum instance count based on your average CU usage
2525
Assuming you have a v2 SKU Application Gateway, autoscaling will take 6-7 minutes to scale out, and by having a higher minimum instance count, the Application Gateway will be better able to handle your traffic when load is increased, as every spike in traffic won't require an autoscaling operation.
26+
27+
## Alert if a certain metric surpasses 75% of average CU utilization
28+
See the [Application Gateway Metrics documentation](https://docs.microsoft.com/azure/application-gateway/application-gateway-metrics#metrics-visualization) for a detailed explanation of our metrics and other walkthroughs.
29+
30+
### Example: Setting up an alert on 75% of minimum CU usage
31+
This example shows setting up an alert when 75% of minimum CU usage is reached via Portal.
32+
1. Navigate to your **Application Gateway**.
33+
2. On the left panel, select **Metrics** under the **Monitoring** tab.
34+
3. Add a metric for **Average Current Compute Units**.
35+
**PLACEHOLDER - ADD A SCREENSHOT PICTURE HERE**
36+
4. If you've set your minimum CU count to be your average usage, go ahead and set an alert for if 75% of your minimum instances are in use. If your minimum/average usage is 10 CUs,, set an alert on 7.5 CUs. This will alert you if usage is increasing and give you time to respond and raise the minimum if you think this traffic will be sustained and will give you an alert that traffic may be increasing.
37+
**PLACEHOLDER - ADD A SCREENSHOT PICTURE HERE**
38+
39+
> [!NOTE]
40+
> You can set the alert to occur at a lower or higher CU utilization percentage depending on how sensitive you want to be to potential traffic spikes.
41+
42+
## Set up WAF with geofiltering and bot protection to stop attacks
43+
If you want an extra layer of security in front of your application, use the Application Gateway WAF_v2 SKU for WAF capabilities. Assuming you are using an Application Gateway WAF_v2 SKU, if you only want your applications to be accessed from a given country or countries, you can set up a WAF custom rule to explicitly allow or block traffic based on their geolocation. For more information, see [geofiltering custom rules](https://docs.microsoft.com/azure/web-application-firewall/ag/geomatch-custom-rules) and [how to configure custom rules on Application Gateway WAF_v2 SKU through Powershell](https://docs.microsoft.com/azure/web-application-firewall/ag/configure-waf-custom-rules).
44+
45+
Enabling bot protection will block known bad bots, and should reduce the amount of traffic getting to your application. For more information, see [bot protection with set up instructions](https://docs.microsoft.com/azure/web-application-firewall/ag/configure-waf-custom-rules).
46+
47+
## Turn on diagnostics on Application Gateway and WAF
48+
Diagnostic logs allow you to view firewall logs, performance logs, and access logs. You can use these logs in Azure to manage and troubleshoot Application Gateways. For instructions on how to set up these logs, see our [diagnostics documentation](https://docs.microsoft.com/azure/application-gateway/application-gateway-diagnostics#diagnostic-logging).
49+
50+
## Set up an SSL policy for extra security
51+
Please ensure you're using the latest version of SSL policy ([AppGwSslPolicy20170401S](https://docs.microsoft.com/azure/application-gateway/application-gateway-ssl-policy-overview#appgwsslpolicy20170401s)) which enforces TLS 1.2 and stronger ciphers. See [configuring SSL policy versions and cipher suites via Powershell](https://docs.microsoft.com/azure/application-gateway/application-gateway-configure-ssl-policy-powershell).

0 commit comments

Comments
 (0)