Skip to content

Commit 707347f

Browse files
committed
fixed blocking issues
1 parent 4676f64 commit 707347f

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed
42.7 KB
Loading
Binary file not shown.

articles/frontdoor/scenario-upload-storage-blobs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,19 +14,19 @@ ms.reviewer: hmb
1414

1515
Uploading files to Azure Storage through Azure Front Door brings certain advantages, including higher resiliency, scalability and extra security, such as scanning of uploaded content with WAF and using custom TLS certificate for storage accounts.
1616

17-
In this reference architecture, you deploy multiple storage accounts and Front Door profile with a multiple origins. By using multiple storage accounts for uploaded content, you improve performance, reliability and able to achieve load distribution/sharding by having different clients use storage accounts in different orders.
17+
In this reference architecture, you deploy multiple storage accounts and Front Door profile with multiple origins. By using multiple storage accounts for uploaded content, you improve performance, reliability and able to achieve load distribution/sharding by having different clients use storage accounts in different orders.
1818

1919
## Architecture
2020

21-
![Architecture diagram showing traffic flowing through Front Door to the storage accounts when uploading blobs](media/scenario-storage-blobs-upload/upload-blob-front-door-architecture-highres.png)
21+
![Architecture diagram showing traffic flowing through Front Door to the storage accounts when uploading blobs.](media/scenario-storage-blobs-upload/upload-blob-front-door-architecture-highres.png)
2222

2323
In this reference architecture, you deploy multiple storage accounts and Azure Front Door profile with multiple origins. You deploy as well Azure App Service to host API, and Azure Service Bus queue.
2424

2525
## Dataflow
2626

2727
Data flows through the scenario as follows:
2828

29-
1. The client app calls a web-based API and retrieve a list of multiple upload locations. For each file that the client uploads, the API generates a list of possible upload locations, with one in each of the existing storage accounts. Each URL contains a Shared Access Signature, ensuring that the URL can only be used to upload to the designated blob URL.
29+
1. The client app calls a web-based API and retrieves a list of multiple upload locations. For each file that the client uploads, the API generates a list of possible upload locations, with one in each of the existing storage accounts. Each URL contains a Shared Access Signature, ensuring that the URL can only be used to upload to the designated blob URL.
3030
2. The client app attempts to upload a blob using first URL from the list returned by API. The client establishes a secure connection to Azure Front Door by using a custom domain name and custom TLS certificate.
3131
3. The Front Door web application firewall (WAF) scans the request. If the WAF determines the request's risk level is too high, it blocks the request and Front Door returns an HTTP 403 error response. Otherwise the request is routed to the desired storage account.
3232
4. File is uploaded into Azure Storage account. If this request fails, the client app will have to try to upload to an alternative storage account using next URL from the list returned by API.
@@ -60,15 +60,15 @@ Azure Front Door configuration includes the following steps:
6060

6161
In the *origin configuration*, you need to specify the origin type as a blob storage account and select the appropriate storage account available within your subscription.
6262

63-
![Screenshot showing origin configuration](media/scenario-storage-blobs-upload/origin.png)
63+
![Screenshot showing origin configuration.](media/scenario-storage-blobs-upload/origin.png)
6464

6565
When configuring the *Origin group route*, you have to specify a path that will be processed for this origin group and make sure to select the newly created origin group and specify the path to the container inside the storage account.
6666

67-
![Screenshot showing route configuration](media/scenario-storage-blobs-upload/route-configuration.png)
67+
![Screenshot showing route configuration.](media/scenario-storage-blobs-upload/route-configuration.png)
6868

6969
Finally, you need to create a new Rule set configuration. It is important to configure *Preserve unmatched path* setting which allows to append the remaining path after the source pattern to the new path.
7070

71-
![Screenshot showing rule set configuration](media/scenario-storage-blobs-upload/ruleset.png)
71+
![Screenshot showing rule set configuration.](media/scenario-storage-blobs-upload/rule-set.png)
7272

7373
## Considerations
7474

0 commit comments

Comments
 (0)