Skip to content

Commit b740ab2

Browse files
Merge pull request #224497 from willvelida/main
Updating Create Front Door profile tutorials
2 parents f422bfc + 0c4c783 commit b740ab2

File tree

2 files changed

+44
-13
lines changed

2 files changed

+44
-13
lines changed

articles/frontdoor/create-front-door-cli.md

Lines changed: 35 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ az group create --name myRGFD --location centralus
2929
```
3030
## Create an Azure Front Door profile
3131

32+
In this step, you'll create the Azure Front Door profile that your two App services will use as your origin.
33+
3234
Run [az afd profile create](/cli/azure/afd/profile#az-afd-profile-create) to create an Azure Front Door profile.
3335

3436
> [!NOTE]
@@ -43,9 +45,7 @@ az afd profile create \
4345

4446
## Create two instances of a web app
4547

46-
You need two instances of a web application that run in different Azure regions for this tutorial. Both the web application instances run in Active/Active mode, so either one can service traffic.
47-
48-
If you don't already have a web app, use the following script to set up two example web apps.
48+
In this step, you'll create two web app instances that run in different Azure regions for this tutorial. Both the web application instances run in Active/Active mode, so either one can service traffic. This configuration differs from an *Active/Stand-By* configuration, where one acts as a failover.
4949

5050
### Create app service plans
5151

@@ -68,7 +68,7 @@ az appservice plan create \
6868

6969
### Create web apps
7070

71-
Run [az webapp create](/cli/azure/webapp#az-webapp-create) to create a web app in each of the app service plans in the previous step. Web app names have to be globally unique.
71+
Once the app service plans have been created, run [az webapp create](/cli/azure/webapp#az-webapp-create) to create a web app in each of the app service plans in the previous step. Web app names have to be globally unique.
7272

7373
```azurecli-interactive
7474
az webapp create \
@@ -102,7 +102,9 @@ az afd profile create \
102102
```
103103
### Add an endpoint
104104

105-
Run [az afd endpoint create](/cli/azure/afd/endpoint#az-afd-endpoint-create) to create an endpoint in your profile. You can create multiple endpoints in your profile after finishing the create experience.
105+
In this step, you'll create an endpoint in your Front Door profile. In Front Door Standard/Premium, an *endpoint* is a logical grouping of one or more routes that are associated with domain names. Each endpoint is assigned a domain name by Front Door, and you can associate endpoints with custom domains by using routes. Front Door profiles can also contain multiple endpoints.
106+
107+
Run [az afd endpoint create](/cli/azure/afd/endpoint#az-afd-endpoint-create) to create an endpoint in your profile.
106108

107109
```azurecli-interactive
108110
az afd endpoint create \
@@ -112,8 +114,12 @@ az afd endpoint create \
112114
--enabled-state Enabled
113115
```
114116

117+
For more information about endpoints in Front Door, please read [Endpoints in Azure Front Door](/azure/frontdoor/endpoint).
118+
115119
### Create an origin group
116120

121+
You'll now create an origin group that will define the traffic and expected responses for your app instances. Origin groups also define how origins should be evaluated by health probes, which you'll also define in this step.
122+
117123
Run [az afd origin-group create](/cli/azure/afd/origin-group#az-afd-origin-group-create) to create an origin group that contains your two web apps.
118124

119125
```azurecli-interactive
@@ -132,7 +138,9 @@ az afd origin-group create \
132138

133139
### Add an origin to the group
134140

135-
Run [az afd origin create](/cli/azure/afd/origin#az-afd-origin-create) to add an origin to your origin group.
141+
You'll now add both of your app instances created earlier as origins to your new origin group. Origins in Front Door refers to applications that Front Door will retrieve contents from when caching isn't enabled or when a cache gets missed.
142+
143+
Run [az afd origin create](/cli/azure/afd/origin#az-afd-origin-create) to add your first app instance as an origin to your origin group.
136144

137145
```azurecli-interactive
138146
az afd origin create \
@@ -149,7 +157,7 @@ az afd origin create \
149157
--https-port 443
150158
```
151159

152-
Repeat this step and add your second origin.
160+
Repeat this step and add your second app instances as an origin to your origin group.
153161

154162
```azurecli-interactive
155163
az afd origin create \
@@ -166,9 +174,13 @@ az afd origin create \
166174
--https-port 443
167175
```
168176

177+
For more information about origins, origin groups and health probes, please read [Origins and origin groups in Azure Front Door](/azure/frontdoor/origin)
178+
169179
### Add a route
170180

171-
Run [az afd route create](/cli/azure/afd/route#az-afd-route-create) to map your endpoint to the origin group. This route forwards requests from the endpoint to your origin group.
181+
You'll now add a route to map the endpoint that you created earlier to the origin group. This route forwards requests from the endpoint to your origin group.
182+
183+
Run [az afd route create](/cli/azure/afd/route#az-afd-route-create) to map your endpoint to the origin group.
172184

173185
```azurecli-interactive
174186
az afd route create \
@@ -182,10 +194,15 @@ az afd route create \
182194
--supported-protocols Http Https \
183195
--link-to-default-domain Enabled
184196
```
185-
Your Front Door profile would become fully functional with the last step.
197+
198+
To learn more about routes in Azure Front Door, please read [Traffic routing methods to origin](/azure/frontdoor/routing-methods).
186199

187200
## Create a new security policy
188201

202+
Azure Web Application Firewall (WAF) on Front Door provides centralized protection for your web applications, defending them against common exploits and vulnerabilities.
203+
204+
In this tutorial, you'll create a WAF policy that adds two managed rules. You can also create WAF policies with custom rules
205+
189206
### Create a WAF policy
190207

191208
Run [az network front-door waf-policy create](/cli/azure/network/front-door/waf-policy#az-network-front-door-waf-policy-create) to create a new WAF policy for your Front Door. This example creates a policy that is enabled and in prevention mode.
@@ -205,8 +222,12 @@ az network front-door waf-policy create \
205222
> [!NOTE]
206223
> If you select `Detection` mode, your WAF doesn't block any requests.
207224
225+
To learn more about WAF policy settings for Front Door, please read [Policy settings for Web Application Firewall on Azure Front Door](/azure/web-application-firewall/afds/waf-front-door-policy-settings).
226+
208227
### Assign managed rules to the WAF policy
209228

229+
Azure-managed rule sets provide an easy way to protect your application against common security threats.
230+
210231
Run [az network front-door waf-policy managed-rules add](/cli/azure/network/front-door/waf-policy/managed-rules#az-network-front-door-waf-policy-managed-rules-add) to add managed rules to your WAF Policy. This example adds Microsoft_DefaultRuleSet_1.2 and Microsoft_BotManagerRuleSet_1.0 to your policy.
211232

212233

@@ -225,8 +246,13 @@ az network front-door waf-policy managed-rules add \
225246
--type Microsoft_BotManagerRuleSet \
226247
--version 1.0
227248
```
249+
250+
To learn more about managed rules in Front Door, please read [Web Application Firewall DRS rule groups and rules](/azure/web-application-firewall/afds/waf-front-door-drs).
251+
228252
### Create the security policy
229253

254+
You'll now apply these two WAF polcies to your Front Door by creating a security policy. This will apply the Azure-managed rules to the endpoint that you defined earlier.
255+
230256
Run [az afd security-policy create](/cli/azure/afd/security-policy#az-afd-security-policy-create) to apply your WAF policy to the endpoint's default domain.
231257

232258
> [!NOTE]

articles/frontdoor/create-front-door-portal.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,9 @@ ms.custom: mode-ui
1616

1717
# Quickstart: Create an Azure Front Door profile - Azure portal
1818

19+
In this quickstart, you'll learn how to create an Azure Front Door profile using the Azure portal. You can create an Azure Front Door profile through *Quick create* with basic configurations or through the *Custom create* which allows a more advanced configuration.
1920

20-
In this quickstart, you'll learn how to create an Azure Front Door profile using the Azure portal. You can create an Azure Front Door profile through *Quick Create* with basic configurations or through the *Custom create* which allows a more advanced configuration. With *Custom create*, you deploy two App services. Then, you create the Azure Front Door profile using the two App services as your origin. Lastly, you'll verify connectivity to your App services using the Azure Front Door frontend hostname.
21+
With *Custom create*, you deploy two App services. Then, you create the Azure Front Door profile using the two App services as your origin. Lastly, you'll verify connectivity to your App services using the Azure Front Door frontend hostname.
2122

2223
## Prerequisites
2324

@@ -62,11 +63,15 @@ An Azure account with an active subscription. [Create an account for free](https
6263
6364
## Create Front Door profile - Custom Create
6465

66+
In the previous tutorial, you created an Azure Front Door profile through *Quick create*, which created your profile with basic configurations.
67+
68+
You'll now create an Azure Front Door profile using *Custom create* and deploy two App services that your Azure Front Door profile will use as your origin.
69+
6570
### Create two Web App instances
6671

6772
If you already have services to use as an origin, skip to [create a Front Door for your application](#create-a-front-door-for-your-application).
6873

69-
In this example, we create two Web App instances that is deployed in two different Azure regions. Both web application instances will run in *Active/Active* mode, so either one can service incoming traffic. This configuration differs from an *Active/Stand-By* configuration, where one acts as a failover.
74+
In this example, we create two Web App instances that are deployed in two different Azure regions. Both web application instances will run in *Active/Active* mode, so either one can service incoming traffic. This configuration differs from an *Active/Stand-By* configuration, where one acts as a failover.
7075

7176
Use the following steps to create two Web Apps used in this example.
7277

@@ -92,7 +97,7 @@ Use the following steps to create two Web Apps used in this example.
9297

9398
1. Select **Review + create**, review the summary, and then select **Create**. Deployment of the Web App can take up to a minute.
9499

95-
1. After your create the first Web App, create a second Web App. Use the same settings as above, except for the following settings:
100+
1. After you create the first Web App, create a second Web App. Use the same settings as above, except for the following settings:
96101

97102
| Setting | Description |
98103
|--|--|
@@ -103,7 +108,7 @@ Use the following steps to create two Web Apps used in this example.
103108

104109
### Create a Front Door for your application
105110

106-
Configure Azure Front Door to direct user traffic based on lowest latency between the two Web Apps origins. You will also secure your Azure Front Door with a Web Application Firewall (WAF) policy.
111+
Configure Azure Front Door to direct user traffic based on lowest latency between the two Web Apps origins. You'll also secure your Azure Front Door with a Web Application Firewall (WAF) policy.
107112

108113
1. Sign in to the [Azure portal](https://portal.azure.com).
109114

0 commit comments

Comments
 (0)