Skip to content

Commit 7b265c6

Browse files
Merge pull request #284443 from duongau/afdfreshness1
Azure Front Door - freshness review batch 2 - 8/12
2 parents 6c20386 + 7695ab0 commit 7b265c6

7 files changed

+36
-37
lines changed

articles/frontdoor/edge-locations-by-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: frontdoor
55
author: duongau
66
ms.service: azure-frontdoor
77
ms.topic: conceptual
8-
ms.date: 05/30/2023
8+
ms.date: 08/12/2024
99
ms.author: duau
1010
ms.custom: references_regions
1111
---

articles/frontdoor/front-door-rules-engine.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: conceptual
99
ms.custom: devx-track-arm-template
10-
ms.date: 05/15/2023
10+
ms.date: 08/12/2024
1111
ms.author: duau
1212
zone_pivot_groups: front-door-tiers
1313
---
@@ -32,11 +32,11 @@ A rule set is a customized rules engine that groups a combination of rules into
3232

3333
* Add, modify, or remove request/response header to hide sensitive information or capture important information through headers.
3434

35-
* Support server variables to dynamically change the request header, response headers or URL rewrite paths/query strings. For example, when a new page load or when a form gets posted. Server variable is currently supported in **[rule set actions](front-door-rules-engine-actions.md)** only.
35+
* Support server variables to dynamically change the request header, response headers, or URL rewrite paths/query strings. For example, when a new page load or when a form gets posted. Server variable is currently supported in **[rule set actions](front-door-rules-engine-actions.md)** only.
3636

3737
## Architecture
3838

39-
Rule sets handle requests at the Front Door edge. When a request arrives at your Front Door endpoint, WAF is processed first, followed by the settings configured in route. Those settings include the rule set associated to the route. Rule sets are processed in the order they appear under the routing configuration. Rules in a rule set also get processed in the order they appear. In order for all the actions in each rule to run, all the match conditions within a rule have to be met. If a request doesn't match any of the conditions in your rule set configuration, then only the default route settings get applied.
39+
Rule sets handle requests at the Front Door edge. When a request arrives at your Front Door endpoint, WAF (Web Application Firewall) is processed first, followed by the settings configured in route. Those settings include the rule set associated to the route. Rule sets are processed in the order they appear under the routing configuration. Rules in a rule set also get processed in the order they appear. In order for all the actions in each rule to run, all the match conditions within a rule have to be met. If a request doesn't match any of the conditions in your rule set configuration, then only the default route settings get applied.
4040

4141
If the **Stop evaluating remaining rules** is selected, then any remaining rule sets associated with the route don't get ran.
4242

@@ -56,15 +56,15 @@ With a Front Door rule set, you can create any combination of configurations, ea
5656

5757
* *Match condition*: There are many match conditions that you can configure to parse an incoming request. A rule can contain up to 10 match conditions. Match conditions are evaluated with an **AND** operator. *Regular expression is supported in conditions*. A full list of match conditions can be found in [Rule set match conditions](rules-match-conditions.md).
5858

59-
* *Action*: An action dictates how Front Door handles the incoming requests based on the matching conditions. You can modify caching behaviors, modify request headers, response headers, set URL rewrite and URL redirection. *Server variables are supported with Action*. A rule can contain up to five actions. A full list of actions can be found in [Rule set actions](front-door-rules-engine-actions.md).
59+
* *Action*: An action dictates how Front Door handles the incoming requests based on the matching conditions. You can modify caching behaviors, modify request headers, response headers, set URL rewrite, and URL redirection. *Server variables are supported with Action*. A rule can contain up to five actions. A full list of actions can be found in [Rule set actions](front-door-rules-engine-actions.md).
6060

6161
## ARM template support
6262

6363
Rule sets can be configured using Azure Resource Manager templates. For an example, see [Front Door Standard/Premium with rule set](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.cdn/front-door-standard-premium-rule-set). You can customize the behavior by using the JSON or Bicep snippets included in the documentation examples for [match conditions](rules-match-conditions.md) and [actions](front-door-rules-engine-actions.md).
6464

6565
## Limitations
6666

67-
For information about quota limits, refer to [Front Door limits, quotas and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-standard-and-premium-service-limits).
67+
For information about quota limits, refer to [Front Door limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-standard-and-premium-service-limits).
6868

6969
## Next steps
7070

@@ -88,7 +88,7 @@ A Rules engine configuration allows you to customize how HTTP requests get handl
8888

8989
## Architecture
9090

91-
Rules engine handles requests at the edge. When a request enters your Azure Front Door (classic) endpoint, WAF is processed first, followed by the Rules engine configuration associated with your frontend domain. If a Rules engine configuration gets processed, that means a match condition has been met. In order for all actions in each rule to be processed, all the match conditions within a rule has to be met. If a request doesn't match any of the conditions in your Rules engine configuration, then the default routing configuration is processed.
91+
Rules engine handles requests at the edge. When a request enters your Azure Front Door (classic) endpoint, WAF is processed first, followed by the Rules engine configuration associated with your frontend domain. If a Rules engine configuration gets processed, that means a match condition was found. In order for all actions in each rule to be processed, all the match conditions within a rule has to be met. If a request doesn't match any of the conditions in your Rules engine configuration, then the default routing configuration is processed.
9292

9393
For example, in the following diagram, a Rules engine is configured to append a response header. The header changes the max-age of the cache control if the request file has an extension of *.jpg*.
9494

@@ -107,7 +107,7 @@ In Azure Front Door (classic) you can create Rules engine configurations of many
107107
- *Rules engine configuration*: A set of rules that are applied to single route. Each configuration is limited to 25 rules. You can create up to 10 configurations.
108108
- *Rules engine rule*: A rule composed of up to 10 match conditions and 5 actions.
109109
- *Match condition*: There are many match conditions that can be utilized to parse your incoming requests. A rule can contain up to 10 match conditions. Match conditions are evaluated with an **AND** operator. For a full list of match conditions, see [Rules match conditions](rules-match-conditions.md).
110-
- *Action*: Actions dictate what happens to your incoming requests - request/response header actions, forwarding, redirects, and rewrites are all available today. A rule can contain up to five actions; however, a rule may only contain one route configuration override. For a full list of actions, see [Rules actions](front-door-rules-engine-actions.md).
110+
- *Action*: Actions dictate what happens to your incoming requests - request/response header actions, forwarding, redirects, and rewrites are all available today. A rule can contain up to five actions; however, a rule might only contain one route configuration override. For a full list of actions, see [Rules actions](front-door-rules-engine-actions.md).
111111

112112
## Next steps
113113

articles/frontdoor/health-probes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: frontdoor
66
author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: conceptual
9-
ms.date: 05/15/2023
9+
ms.date: 08/12/2024
1010
ms.author: duau
1111
---
1212

articles/frontdoor/how-to-configure-endpoints.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: frontdoor
66
author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: how-to
9-
ms.date: 06/02/2023
9+
ms.date: 08/12/2024
1010
ms.author: duau
1111
---
1212

@@ -32,7 +32,7 @@ Before you can create a new endpoint with Front Door manager, you must have an A
3232

3333

3434
* **Name** - Enter a unique name for the new Front Door endpoint. Azure Front Door generates a unique endpoint hostname based on the endpoint name in the form of `<endpointname>-hash.z01.azurefd.net`.
35-
* **Endpoint hostname** - A deterministic DNS name that helps prevent subdomain takeover. This name is used to access your resources through your Azure Front Door at the domain `<endpointname>-hash.z01.azurefd.net`.
35+
* **Endpoint hostname** - A deterministic DNS (domain name system) name that helps prevent subdomain takeover. This name is used to access your resources through your Azure Front Door at the domain `<endpointname>-hash.z01.azurefd.net`.
3636
* **Status** - Set as checked to enable this endpoint.
3737

3838
### Add a route
@@ -52,8 +52,8 @@ Before you can create a new endpoint with Front Door manager, you must have an A
5252

5353
* **Name** - Enter a unique name for the new route
5454
* **Enable route** - Set as checked to enable this route.
55-
* **Domains** - Select one or more domains that have been validated and isn't associated to another route. For more information, see [add a custom domain](standard-premium/how-to-add-custom-domain.md).
56-
* **Patterns to match** - Configure all URL path patterns that this route accepts. For example, you can set the pattern to match to `/images/*` to accept all requests on the URL `www.contoso.com/images/*`. Azure Front Door determines the traffic based on exact match first. If no paths match exactly, then Front Door looks for a wildcard path that matches. If no routing rules are found with a matching path, then the request get rejected and returns a 400: Bad Request error HTTP response. Patterns to match paths are not case sensitive, meaning paths with different casing are treated as duplicates. For example, you have a host using the same protocol with paths `/FOO` and `/foo`. These paths are considered duplicates, and aren't allowed in the *Patterns to match* field.
55+
* **Domains** - Select one or more validated domains that aren't associated to another route. For more information, see [add a custom domain](standard-premium/how-to-add-custom-domain.md).
56+
* **Patterns to match** - Configure all URL path patterns that this route accepts. For example, you can set the pattern to match to `/images/*` to accept all requests on the URL `www.contoso.com/images/*`. Azure Front Door determines the traffic based on exact match first. If no paths match exactly, then Front Door looks for a wildcard path that matches. If no routing rules are found with a matching path, then the request get rejected and returns a 400: Bad Request error HTTP response. Patterns to match paths aren't case sensitive, meaning paths with different casing are treated as duplicates. For example, you have a host using the same protocol with paths `/FOO` and `/foo`. These paths are considered duplicates, and aren't allowed in the *Patterns to match* field.
5757
* **Accepted protocols** - Specify the protocols you want Azure Front Door to accept when the client is making the request. You can specify HTTP, HTTPS, or both.
5858
* **Redirect** - Specify whether HTTPS is enforced for the incoming HTTP requests.
5959
* **Origin group** - Select the origin group to forward traffic to when requests are made to the origin. For more information, see [configure an origin group](standard-premium/how-to-create-origin.md).
@@ -85,23 +85,23 @@ Before you can create a new endpoint with Front Door manager, you must have an A
8585

8686
* **Name** - Enter a unique name within this Front Door profile for the security policy.
8787
* **Domains** - Select one or more domains you want to apply this security policy to.
88-
* **WAF Policy** - Select an existing or create a new WAF policy. When you select an existing WAF policy, it must be the same tier as the Front Door profile. For more information, see [configure WAF policy for Front Door](../web-application-firewall/afds/waf-front-door-create-portal.md).
88+
* **WAF (Web Application Firewall) Policy** - Select an existing or create a new WAF policy. When you select an existing WAF policy, it must be the same tier as the Front Door profile. For more information, see [configure WAF policy for Front Door](../web-application-firewall/afds/waf-front-door-create-portal.md).
8989

9090
1. Select **Save** to create the security policy and associate it with the endpoint.
9191

9292
:::image type="content" source="./media/how-to-configure-endpoints/associated-security-policy.png" alt-text="Screenshot of security policy associated with an endpoint." lightbox="./media/how-to-configure-endpoints/associated-security-policy-expanded.png":::
9393

9494
## Configure origin timeout
9595

96-
Origin timeout is the amount of time Azure Front Door waits until it considers the connection to origin has timed out. You can set this value on the overview page of the Azure Front Door profile. This value is applied to all endpoints in the profile.
96+
Origin timeout is the amount of time Azure Front Door waits until it considers the connection to origin valid. You can set this value on the overview page of the Azure Front Door profile. This value is applied to all endpoints in the profile.
9797

9898
:::image type="content" source="./media/how-to-configure-endpoints/origin-timeout.png" alt-text="Screenshot of the origin timeout settings on the overview page of the Azure Front Door profile.":::
9999

100100
## Clean up resources
101101

102102
In order to remove an endpoint, you first have to remove any security policies associated with the endpoint. Then select **Delete endpoint** to remove the endpoint from the Azure Front Door profile.
103103

104-
:::image type="content" source="./media/how-to-configure-endpoints/delete-endpoint.png" alt-text="Screenshot of the delete endpoint button from inside an endpoint." lightbox="./media/how-to-configure-endpoints/delete-endpoint-expanded.png":::
104+
:::image type="content" source="./media/how-to-configure-endpoints/delete-endpoint.png" alt-text="Screenshot of the deleted endpoint button from inside an endpoint." lightbox="./media/how-to-configure-endpoints/delete-endpoint-expanded.png":::
105105

106106
## Next steps
107107

articles/frontdoor/standard-premium/how-to-enable-private-link-internal-load-balancer.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: frontdoor
66
author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 08/12/2024
1010
ms.author: duau
1111
---
1212

@@ -17,7 +17,7 @@ This article guides you through how to configure Azure Front Door Premium to con
1717
## Prerequisites
1818

1919
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
20-
* Review [Secure your origin with Private Link](../private-link.md) to understand how Private Link works with Azure Front Door.
20+
* Review the [Secure your origin with Private Link](../private-link.md) documentation to better understand how Private Link works with Azure Front Door.
2121
* Create a [Private Link](../../private-link/create-private-link-service-portal.md) service for your origin web servers.
2222

2323
## Enable private connectivity to an internal load balancer
@@ -28,7 +28,7 @@ In this section, you map the Private Link service to a private endpoint created
2828

2929
1. Navigate to your Azure Front Door Premium profile, then select **Origin groups** from under *Settings* in the left side menu pane.
3030

31-
1. Select an existing or create a new origin group to add an internal load balancer origin.
31+
1. Select an existing origin group or create a new one to add to an internal load balancer origin.
3232

3333
1. Select **+ Add an origin** to add new origin. Select or enter the following settings to configure the internal load balancer origin.
3434

@@ -72,7 +72,7 @@ In this section, you map the Private Link service to a private endpoint created
7272

7373
:::image type="content" source="../media/how-to-enable-private-link-internal-load-balancer/private-endpoint-pending-approval.png" alt-text="Screenshot of pending approval for private link.":::
7474

75-
1. The *connection state* should change to **Approved**. It may take a couple of minutes for the connection to fully establish. You can now access your internal load balancer from Azure Front Door.
75+
1. The *connection state* should change to **Approved**. It might take a couple of minutes for the connection to fully establish. You can now access your internal load balancer from Azure Front Door.
7676

7777
:::image type="content" source="../media/how-to-enable-private-link-storage-account/private-endpoint-approved.png" alt-text="Screenshot of approved private link request.":::
7878

0 commit comments

Comments
 (0)