Skip to content

Commit ce3b342

Browse files
Merge pull request #233396 from duongau/afdorigin
Azure Front Door - Origin and origin groups - freshness update
2 parents 9bdae98 + 0a3edf4 commit ce3b342

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/frontdoor/origin.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: duongau
77
ms.service: frontdoor
88
ms.topic: conceptual
99
ms.workload: infrastructure-services
10-
ms.date: 03/10/2022
10+
ms.date: 04/04/2023
1111
ms.author: duau
1212
zone_pivot_groups: front-door-tiers
1313
---
@@ -22,11 +22,11 @@ zone_pivot_groups: front-door-tiers
2222
2323
::: zone-end
2424

25-
This article describes concepts about how to map your web application deployment with Azure Front Door. You'll also learn about what an *origin* and *origin group* is in the Azure Front Door configuration.
25+
This article describes concepts about how to map your web application deployment with Azure Front Door. You learn about what an *origin* and *origin group* is in the Azure Front Door configuration.
2626

2727
## Origin
2828

29-
An origin refers to the application deployment that Azure Front Door will retrieve contents from when caching isn't enabled or when a cache gets missed. Azure Front Door supports origins hosted in Azure as well as applications hosted in your on-premises datacenter or with another cloud provider. An origin shouldn't be confused with your database tier or storage tier. The origin should be viewed as the endpoint for your application backend. When you add an origin to an origin group in the Front Door configuration, you must also configure the following:
29+
An origin refers to the application deployment that Azure Front Door retrieves contents from when caching isn't enabled or when a cache gets missed. Azure Front Door supports origins hosted in Azure and applications hosted in your on-premises datacenter or with another cloud provider. An origin shouldn't be confused with your database tier or storage tier. The origin should be viewed as the endpoint for your application backend. When you add an origin to an origin group in the Front Door configuration, you must also configure the following settings:
3030

3131
* **Origin type:** The type of resource you want to add. Front Door supports autodiscovery of your application backends from App Service, Cloud Service, or Storage. If you want a different resource in Azure or even a non-Azure backend, select **Custom host**.
3232

@@ -39,7 +39,7 @@ An origin refers to the application deployment that Azure Front Door will retrie
3939

4040
* **Private Link:** Azure Front Door Premium tier supports sending traffic to an origin by using Private Link. For more information, see [Secure your Origin with Private Link](private-link.md).
4141

42-
* **Certificate subject name validation:** during Azure Front Door to origin TLS connection, Azure Front Door will validate if the request host name matches the host name in the certificate provided by the origin. From a security standpoint, Microsoft doesn't recommend disabling certificate subject name check. For more information, see [End-to-end TLS encryption](end-to-end-tls.md), especially if you want to disable this feature.
42+
* **Certificate subject name validation:** during Azure Front Door to origin TLS connection, Azure Front Door validates if the request host name matches the host name in the certificate provided by the origin. From a security standpoint, Microsoft doesn't recommend disabling certificate subject name check. For more information, see [End-to-end TLS encryption](end-to-end-tls.md), especially if you want to disable this feature.
4343

4444
::: zone-end
4545

@@ -51,11 +51,11 @@ An origin refers to the application deployment that Azure Front Door will retrie
5151

5252
### Origin host header
5353

54-
Requests that are forwarded by Azure Front Door to an origin will include a host header field that the origin uses to retrieve the targeted resource. The value for this field typically comes from the origin URI that has the host header and port.
54+
Requests that get forwarded by Azure Front Door to an origin include a host header field that the origin uses to retrieve the targeted resource. The value for this field typically comes from the origin URI that has the host header and port.
5555

56-
For example, a request made for `www.contoso.com` will have the host header `www.contoso.com`. If you use the Azure portal to configure your origin, the default value for this field is the host name of the origin. If your origin is `contoso-westus.azurewebsites.net`, in the Azure portal, the autopopulated value for the origin host header will be `contoso-westus.azurewebsites.net`. However, if you use Azure Resource Manager templates or another method without explicitly setting this field, Front Door will send the incoming host name as the value for the host header. If the request was made for `www.contoso.com`, and your origin `contoso-westus.azurewebsites.net` has an empty header field, Front Door will set the host header as `www.contoso.com`.
56+
For example, a request made for `www.contoso.com` has the host header `www.contoso.com`. If you use the Azure portal to configure your origin, the default value for this field is the host name of the origin. If your origin is `contoso-westus.azurewebsites.net`, in the Azure portal, the autopopulated value for the origin host header is `contoso-westus.azurewebsites.net`. However, if you use Azure Resource Manager templates or another method without explicitly setting this field, Front Door sends the incoming host name as the value for the host header. If the request was made for `www.contoso.com`, and your origin `contoso-westus.azurewebsites.net` has an empty header field, Front Door sets the host header as `www.contoso.com`.
5757

58-
Most app backends (Azure Web Apps, Blob storage, and Cloud Services) require the host header to match the domain of the backend. However, the frontend host that routes to your origin will use a different hostname such as `www.contoso.net`.
58+
Most app backends (Azure Web Apps, Blob storage, and Cloud Services) require the host header to match the domain of the backend. However, the frontend host that routes to your origin uses a different hostname such as `www.contoso.net`.
5959

6060
If your origin requires the host header to match the origin hostname, make sure that the origin host header includes the hostname of the origin.
6161

@@ -67,19 +67,19 @@ To configure the **origin host header** field for an origin in the origin gr
6767

6868
1. Add an origin if you haven't done so, or edit an existing one.
6969

70-
1. Set the origin host header field to a custom value or leave it blank. The hostname for the incoming request will be used as the host header value.
70+
1. Set the origin host header field to a custom value or leave it blank. The hostname for the incoming request gets used as the host header value.
7171

7272
## Origin group
7373

7474
An origin group in Azure Front Door refers to a set of origins that receives similar traffic for their application. You can define the origin group as a logical grouping of your application instances across the world that receives the same traffic and responds with an expected behavior. These origins can be deployed across different regions or within the same region. All origins can be deployed in an Active/Active or Active/Passive configuration.
7575

76-
An origin group defines how origins should be evaluated by health probes. It also defines the load balancing method between them.
76+
An origin group defines how origins get evaluated by health probes. It also defines the load balancing method between them.
7777

7878
### Health probes
7979

8080
Azure Front Door sends periodic HTTP/HTTPS probe requests to each of your configured origins. Probe requests determine the proximity and health of each origin to load balance your end-user requests. Health probe settings for an origin group define how we poll the health status of app backends. The following settings are available for load-balancing configuration:
8181

82-
* **Path**: The URL used for probe requests for all the origins in the origin group. For example, if one of your origins is `contoso-westus.azurewebsites.net` and the path gets set to /probe/test.aspx, then Front Door environments, assuming the protocol is HTTP, will send health probe requests to `http://contoso-westus.azurewebsites.net/probe/test.aspx`.
82+
* **Path**: The URL used for probe requests for all the origins in the origin group. For example, if one of your origins is `contoso-westus.azurewebsites.net` and the path gets set to /probe/test.aspx, then Front Door sends health probe requests to `http://contoso-westus.azurewebsites.net/probe/test.aspx` if the protocol is set to HTTP.
8383

8484
* **Protocol**: Defines whether to send the health probe requests from Front Door to your origins with HTTP or HTTPS protocol.
8585

@@ -103,7 +103,7 @@ Load-balancing settings for the origin group define how we evaluate health probe
103103

104104
* **Successful sample size:** Defines the sample size as previously mentioned, the number of successful samples needed to call the origin healthy. For example, assume a Front Door health probe interval is 30 seconds, sample size is 5, and successful sample size is 3. Each time we evaluate the health probes for your origin, we look at the last five samples over 150 seconds (5 x 30). At least three successful probes are required to declare the origin as healthy.
105105

106-
* **Latency sensitivity (extra latency):** Defines whether you want Azure Front Door to send the request to the origin within the latency measurement sensitivity range or forward the request to the closest backend.
106+
* **Latency sensitivity (extra latency):** Defines if you want Front Door to send the request to the origin within the latency measurement sensitivity range or forward the request to the closest backend.
107107

108108
For more information, see [Least latency based routing method](routing-methods.md#latency).
109109

0 commit comments

Comments
 (0)