Skip to content

Commit caa3092

Browse files
committed
tutorial updates, PR feedback
1 parent bb21621 commit caa3092

File tree

1 file changed

+25
-25
lines changed

1 file changed

+25
-25
lines changed

articles/reliability/reliability-health-data-services-deidentification.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -20,23 +20,21 @@ This article describes reliability support in the de-identification service (pre
2020
[!INCLUDE [introduction to disaster recovery](includes/reliability-disaster-recovery-description-include.md)]
2121

2222
Each de-identification service (preview) is deployed to a single Azure region. In the event of a region-wide degredation or outage:
23-
- ARM control plane functionality will be limited to read-only for the duration of the outage. Your service metadata (such as resource properties) will be backed up outside of the region by Microsoft. Once the outage is over, you can read and write to the control plane.
24-
- All data plane requests will fail for the duration of the outage, such as de-identification or job API requests. No customer data will be lost, but there is the potential for job progress metadata to be lost. Once the outage is over, you can read and write to the data plane.
23+
- ARM control plane functionality is limited to read-only during the outage. Your service metadata (such as resource properties) is always backed up outside of the region by Microsoft. Once the outage is over, you can read and write to the control plane.
24+
- All data plane requests fail during the outage, such as de-identification or job API requests. No customer data is lost, but there is the potential for job progress metadata to be lost. Once the outage is over, you can read and write to the data plane.
2525

2626
### Disaster recovery tutorial
27-
You can assure high availability of your workloads even during a region-wide outage or degradation by deploying two or more de-identification services in an active-active configuration.
28-
In active-active disaster recovery architecture, de-identification services are deployed in two separate regions and Azure Front door is used to route traffic to both regions.
27+
If an entire Azure region is not available, you can still assure high availability of your workloads. You can deploy two or more de-identification services in an active-active configuration, with Azure Front door used to route traffic to both regions.
2928

3029
With this example architecture:
3130

3231
- Identical de-identification services are deployed in two separate regions.
3332
- Azure Front Door is used to route traffic to both regions.
34-
- During a disaster, one region becomes offline, and Azure Front Door routes traffic exclusively to the other region. The recovery time objective during such a geo-failover is near-zero.
35-
- Your application should be able to re-run jobs that were last observed as running but cannot be found. This ensures that the recovery point objective is limited to the job progress that is not available.
33+
- During a disaster, one region becomes offline, and Azure Front Door routes traffic exclusively to the other region. The recovery time objective during such a geo-failover is limited to the time Azure Front Door takes to detect that one service is unhealthy.
3634

3735
#### RTO and RPO
3836

39-
If you adopt the active-active configuration described above, you should expect a recovery time objective (RTO) of **5 minutes**. In any configuration, you should expect a recovery point objective (RPO) of **0 minutes** (no customer data will be lost).
37+
If you adopt the active-active configuration, you should expect a recovery time objective (RTO) of **5 minutes**. In any configuration, you should expect a recovery point objective (RPO) of **0 minutes** (no customer data will be lost).
4038

4139
### Validate disaster recovery plan
4240
#### Prerequisites
@@ -49,7 +47,7 @@ To complete this tutorial:
4947

5048
#### Create a resource group
5149

52-
You need two instances of a de-identification service (preview) in different Azure regions for this tutorial. The tutorial will use the [region pair](../availability-zones/cross-region-replication-azure.md#azure-paired-regions) East US/West US as your two regions, but feel free to choose your own regions.
50+
You need two instances of a de-identification service (preview) in different Azure regions for this tutorial. The tutorial uses the [region pair](../availability-zones/cross-region-replication-azure.md#azure-paired-regions) East US/West US as your two regions, but feel free to choose your own regions.
5351

5452
To make management and clean-up simpler, you use a single resource group for all resources in this tutorial. Consider using separate resource groups for each region/resource to further isolate your resources in a disaster recovery situation.
5553

@@ -105,26 +103,27 @@ az afd endpoint create --resource-group my-deid --endpoint-name myendpoint --pro
105103

106104
#### Create an origin group
107105

108-
Run [`az afd origin-group create`](/cli/azure/afd/origin-group#az-afd-origin-group-create) to create an origin group that contains your two web apps.
106+
Run [`az afd origin-group create`](/cli/azure/afd/origin-group#az-afd-origin-group-create) to create an origin group that contains your two de-identification services.
109107

110108
```azurecli-interactive
111-
az afd origin-group create --resource-group my-deid --origin-group-name myorigingroup --profile-name myfrontdoorprofile --probe-request-type GET --probe-protocol Https --probe-interval-in-seconds 60 --probe-path /health --sample-size 4 --successful-samples-required 3 --additional-latency-in-milliseconds 50
109+
az afd origin-group create --resource-group my-deid --origin-group-name myorigingroup --profile-name myfrontdoorprofile --probe-request-type GET --probe-protocol Https --probe-interval-in-seconds 60 --probe-path /health --sample-size 4 --successful-samples-required 3 --additional-latency-in-milliseconds 50 --enable-health-probe
112110
```
113111

114112
|Parameter |Value |Description |
115113
|---------|---------|---------|
116114
|`origin-group-name` |`myorigingroup` |Name of the origin group. |
117115
|`probe-request-type` |`GET` |The type of health probe request that is made. |
118-
|`probe-protocol` |`Http` |Protocol to use for health probe. |
116+
|`probe-protocol` |`Https` |Protocol to use for health probe. |
119117
|`probe-interval-in-seconds` |`60` |The number of seconds between health probes. |
120-
|`probe-path` |`/` |The path relative to the origin that is used to determine the health of the origin. |
118+
|`probe-path` |`/health` |The path relative to the origin that is used to determine the health of the origin. |
121119
|`sample-size` |`4` |The number of samples to consider for load balancing decisions. |
122120
|`successful-samples-required` |`3` |The number of samples within the sample period that must succeed. |
123121
|`additional-latency-in-milliseconds` |`50` |The extra latency in milliseconds for probes to fall into the lowest latency bucket. |
122+
|`enable-health-probe` | | Switch to control the status of the health probe. |
124123

125-
### Add an origin to the group
124+
### Add origins to the group
126125

127-
Run [`az afd origin create`](/cli/azure/afd/origin#az-afd-origin-create) to add an origin to your origin group. For the `--host-name` parameter, replace the placeholder for `<web-app-east-us>` with your app name in that region. Notice the `--priority` parameter is set to `1`, which indicates all traffic is sent to your primary app.
126+
Run [`az afd origin create`](/cli/azure/afd/origin#az-afd-origin-create) to add an origin to your origin group. For the `--host-name` and `--origin-host-header` parameters, replace the placeholder value `<service-url-east-us>` with your East US service URL, leaving out the scheme (`https://`). You should have a value like `abcdefghijk.api.eastus.deid.azure.com`.
128127

129128
```azurecli-interactive
130129
az afd origin create --resource-group my-deid --host-name <service-url-east-us> --profile-name myfrontdoorprofile --origin-group-name myorigingroup --origin-name primarydeid --origin-host-header <service-url-east-us> --priority 1 --weight 1000 --enabled-state Enabled --https-port 443
@@ -133,33 +132,34 @@ az afd origin create --resource-group my-deid --host-name <service-url-east-us>
133132
|Parameter |Value |Description |
134133
|---------|---------|---------|
135134
|`host-name` |`<service-url-east-us>` |The hostname of the primary de-identification service. |
136-
|`origin-name` |`primarydeid` |Name of the origin. |
137-
|`origin-host-header` |`<service-url-east-us>` |The host header to send for requests to this origin. If you leave this blank, the request hostname determines this value. Azure CDN origins, such as Web Apps, Blob Storage, and Cloud Services require this host header value to match the origin hostname by default. |
135+
|`origin-name` |`deid1` |Name of the origin. |
136+
|`origin-host-header` |`<service-url-east-us>` |The host header to send for requests to this origin. |
138137
|`priority` |`1` |Set this parameter to 1 to direct all traffic to the primary de-identification service. |
139138
|`weight` |`1000` |Weight of the origin in given origin group for load balancing. Must be between 1 and 1000. |
140139
|`enabled-state` |`Enabled` |Whether to enable this origin. |
141140
|`https-port` |`443` |The port used for HTTPS requests to the origin. |
142141

143-
Repeat this step to add your second origin. Pay attention to the `--priority` parameter. For this origin, it's set to `2`. This priority setting tells Azure Front Door to direct all traffic to the primary origin unless the primary goes down. If you set the priority for this origin to `1`, Azure Front Door treats both origins as active and direct traffic to both regions. Be sure to replace both instances of the placeholder for `<service-url-east-us>` with the service url.
144-
142+
Repeat this step to add your second origin. For the `--host-name` and `--origin-host-header` parameters, replace the placeholder value `<service-url-west-us>` with your West US service URL, leaving out the scheme (`https://`).
143+
145144
```azurecli-interactive
146-
az afd origin create --resource-group my-deid --host-name <service-url-west-us> --profile-name myfrontdoorprofile --origin-group-name myorigingroup --origin-name secondarydeid --origin-host-header <service-url-west-us> --priority 2 --weight 1000 --enabled-state Enabled --https-port 443
145+
az afd origin create --resource-group my-deid --host-name <service-url-west-us> --profile-name myfrontdoorprofile --origin-group-name myorigingroup --origin-name deid2 --origin-host-header <service-url-west-us> --priority 1 --weight 1000 --enabled-state Enabled --https-port 443
147146
```
148147

148+
Pay attention to the `--priority` parameters in both commands. Because both origins are set to priority `1`, Azure Front Door treats both origins as active and direct traffic to both regions. If the priority for one origin is set to `2`, Azure Front Door will treat that origin as secondary and will direct all traffic to the other origin unless it goes down.
149+
149150
#### Add a route
150151

151152
Run [`az afd route create`](/cli/azure/afd/route#az-afd-route-create) to map your endpoint to the origin group. This route forwards requests from the endpoint to your origin group.
152153

153154
```azurecli-interactive
154-
az afd route create --resource-group my-deid --profile-name myfrontdoorprofile --endpoint-name myendpoint --forwarding-protocol MatchRequest --route-name route --https-redirect Enabled --origin-group myorigingroup --supported-protocols Https --link-to-default-domain Enabled
155+
az afd route create --resource-group my-deid --profile-name myfrontdoorprofile --endpoint-name myendpoint --forwarding-protocol MatchRequest --route-name route --origin-group myorigingroup --supported-protocols Https --link-to-default-domain Enabled
155156
```
156157

157158
|Parameter |Value |Description |
158159
|---------|---------|---------|
159160
|`endpoint-name` |`myendpoint` |Name of the endpoint. |
160-
|forwarding-protocol |MatchRequest |Protocol this rule uses when forwarding traffic to backends. |
161+
|`forwarding-protocol` |MatchRequest |Protocol this rule uses when forwarding traffic to backends. |
161162
|`route-name` |`route` |Name of the route. |
162-
|https-redirect |`Enabled` |Whether to automatically redirect HTTP traffic to HTTPS traffic. |
163163
|`supported-protocols` |`Https` |List of supported protocols for this route. |
164164
|`link-to-default-domain` |`Enabled` |Whether this route is linked to the default endpoint domain. |
165165

@@ -169,7 +169,7 @@ Allow about 15 minutes for this step to complete as it takes some time for this
169169

170170
When you create the Azure Front Door Standard/Premium profile, it takes a few minutes for the configuration to be deployed globally. Once completed, you can access the frontend host you created.
171171

172-
Run [`az afd endpoint show`](/cli/azure/afd/endpoint#az-afd-endpoint-show) to get the hostname of the Front Door endpoint.
172+
Run [`az afd endpoint show`](/cli/azure/afd/endpoint#az-afd-endpoint-show) to get the hostname of the Front Door endpoint. It should look like `abddefg.azurefd.net`
173173

174174
```azurecli-interactive
175175
az afd endpoint show --resource-group my-deid --profile-name myfrontdoorprofile --endpoint-name myendpoint --query "hostName"
@@ -190,7 +190,7 @@ To test instant global failover:
190190
1. Refresh your browser. This time, you should see an error message.
191191
1. Re-enable public network access for one of the de-identification services. Refresh your browser and you should see the health status again.
192192

193-
You've now validated that you can access your apps through Azure Front Door and that failover functions as intended. Enable public network access on the other service if you're done with failover testing.
193+
You've now validated that you can access your services through Azure Front Door and that failover functions as intended. Enable public network access on the other service if you're done with failover testing.
194194

195195
#### Clean up resources
196196

@@ -207,4 +207,4 @@ In the case of disaster, you can check the health status of your de-identificati
207207

208208
## Related content
209209

210-
- [Reliability in Azure](/azure/availability-zones/overview.md)
210+
- [Reliability in Azure](/azure/reliability/overview)

0 commit comments

Comments
 (0)