You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Using multiple `send-one-way-request` policies in outbound section is not supported in self-hosted gateway.
63
+
60
64
## Example
61
65
62
66
This example uses the `send-one-way-request` policy to send a message to a Slack chat room if the HTTP response code is greater than or equal to 500. For more information on this sample, see [Using external services from the Azure API Management service](./api-management-sample-send-request.md).
@@ -91,4 +95,4 @@ This example uses the `send-one-way-request` policy to send a message to a Slack
91
95
92
96
*[Integration and external communication](api-management-policies.md#integration-and-external-communication)
Copy file name to clipboardExpand all lines: articles/frontdoor/refstring.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,6 @@
1
1
---
2
-
title: Troubleshooting 4xx and 5xx erorrs using Reference String
2
+
title: Troubleshoot 4xx and 5xx Errors Using Reference String
3
+
titleSuffix: Azure Front Door
3
4
description: This article provides information about what a Reference String is, how to collect them, and use the Azure portal diagnostic tool for troubleshooting 4xx and 5xx errors.
4
5
author: Alej-b23
5
6
ms.author: pagonzalez
@@ -10,13 +11,13 @@ ms.date: 12/03/2024
10
11
#CustomerIntent: As a web developer, I want troubleshoot my web application using a Reference String.
11
12
---
12
13
13
-
# Troubleshooting 4xx and 5xx errors using Reference String
14
+
# Troubleshoot 4xx and 5xx errors using Reference String
14
15
15
16
A guide to understand and use Reference Strings for diagnosing and resolving issues with Azure Front Door.
16
17
17
18
## Prerequisites
18
19
19
-
* You must have an Azure Front Door profile. To create a profile, see [Creating an Azure Front Door profile](create-front-door-portal.md).
20
+
* You must have an Azure Front Door profile. To create a profile, see [Create an Azure Front Door profile](create-front-door-portal.md).
20
21
21
22
## What is a Reference String?
22
23
@@ -90,4 +91,4 @@ For more information on tracking references and access log parameters, see [Moni
90
91
## Next steps
91
92
92
93
* To learn more about navigating common issues, see [Front Door Troubleshooting Issues](troubleshoot-issues.md).
93
-
* For answers to common questions, see [Azure Front Door FAQ](front-door-faq.yml).
94
+
* For answers to common questions, see [Azure Front Door FAQ](front-door-faq.yml).
Copy file name to clipboardExpand all lines: articles/frontdoor/scenario-storage-blobs.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Azure Front Door enhances the delivery of static content from Azure Storage blob
18
18
19
19
In this reference architecture, a storage account and an Azure Front Door profile with a single origin are deployed.
20
20
21
-
## Dataflow
21
+
## Data flow
22
22
23
23
The data flows through the scenario as follows:
24
24
@@ -40,7 +40,7 @@ The data flows through the scenario as follows:
40
40
41
41
If you store static files with another cloud storage provider or on your own infrastructure, this scenario still largely applies. However, you need to ensure that incoming traffic to your origin server is verified to come through Front Door. If your storage provider doesn't support Private Link, consider using an alternative approach like [allowlisting the Front Door service tag and inspecting the `X-Azure-FDID` header](origin-security.md).
42
42
43
-
## Scenario Details
43
+
## Scenario details
44
44
45
45
Static content delivery is beneficial in many situations, such as:
46
46
- Delivering images, CSS files, and JavaScript files for a web application.
@@ -53,7 +53,7 @@ In complex scenarios, a single Front Door profile can serve both static and dyna
53
53
54
54
## Considerations
55
55
56
-
### Scalability and Performance
56
+
### Scalability and performance
57
57
58
58
Azure Front Door acts as a content delivery network (CDN), caching content at its globally distributed PoPs. When a cached response is available, Azure Front Door quickly serves it, enhancing performance and reducing the load on the origin. If the PoP lacks a valid cached response, Azure Front Door's traffic acceleration capabilities expedite content delivery from the origin.
59
59
@@ -63,12 +63,12 @@ Azure Front Door acts as a content delivery network (CDN), caching content at it
63
63
64
64
Azure Front Door is designed for internet-facing scenarios and is optimized for publicly accessible blobs. To authenticate access to blobs, consider using [shared access signatures (SAS)](../storage/common/storage-sas-overview.md). Ensure you enable the [*Use Query String* behavior](front-door-caching.md#query-string-behavior) to prevent Azure Front Door from serving requests to unauthenticated clients. This approach might limit the effectiveness of caching, as each request with a different SAS must be sent to the origin.
65
65
66
-
#### Origin Security
66
+
#### Origin security
67
67
68
-
- If you are using the premium tier, Azure Front Door can connect securely to the Azure Storage account using [Private Link](private-link.md). The storage account can be configured to deny public network access, allowing requests only through the private endpoint used by Azure Front Door. This setup ensures all requests get processed by Azure Front Door, protecting your storage account from direct internet exposure.
69
-
- If you are using the standard tier, you can secure requests with a [shared access signature (SAS)](../storage/common/storage-sas-overview.md) and either have clients include the SAS in their requests or use the Azure Front Door [rules engine](front-door-rules-engine.md) to attach it. Note that the storage account's network access must be publicly accessible (from all networks or from Front Door IP addresses in AzureFrontDoor.Backend service tag).
68
+
- If you're using the premium tier, Azure Front Door can connect securely to the Azure Storage account using [Private Link](private-link.md). The storage account can be configured to deny public network access, allowing requests only through the private endpoint used by Azure Front Door. This setup ensures all requests get processed by Azure Front Door, protecting your storage account from direct internet exposure.
69
+
- If you're using the standard tier, you can secure requests with a [shared access signature (SAS)](../storage/common/storage-sas-overview.md) and either have clients include the SAS in their requests or use the Azure Front Door [rules engine](front-door-rules-engine.md) to attach it. The storage account's network access must be publicly accessible (from all networks or from Front Door IP addresses in `AzureFrontDoor.Backend` service tag).
70
70
71
-
#### Custom Domain Names
71
+
#### Custom domain names
72
72
73
73
Azure Front Door supports custom domain names and can manage TLS certificates for these domains. Using custom domains ensures clients receive files from a trusted source, with TLS encrypting every connection to Azure Front Door. Azure Front Door's management of TLS certificates helps avoid outages and security issues from invalid or outdated certificates.
74
74
@@ -86,18 +86,18 @@ Using the Azure Front Door cache reduces the load on your storage account. If yo
86
86
87
87
To further improve resiliency, consider the redundancy of your storage account. For more information, see [Azure Storage redundancy](../storage/common/storage-redundancy.md). Alternatively, deploy multiple storage accounts and configure multiple origins in your Azure Front Door origin group. Set up fail over between origins by configuring each origin's priority. For more information, see [Origins and origin groups in Azure Front Door](origin.md).
88
88
89
-
### Cost Optimization
89
+
### Cost optimization
90
90
91
91
Caching helps reduce the cost of delivering static content. Azure Front Door's PoPs store copies of responses and can deliver these cached responses for subsequent requests, reducing the request load on the origin. In high-scale static content solutions, especially those delivering large files, caching can significantly reduce traffic costs.
92
92
93
93
To use Private Link in this solution, deploy the premium tier of Azure Front Door. The standard tier can be used if you don't need to block direct traffic to your storage account. For more information, see [Origin security](#origin-security).
94
94
95
-
## Deploy This Scenario
95
+
## Deploy this scenario
96
96
97
97
To deploy this scenario using Bicep or JSON ARM templates, [see this quickstart](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.cdn/front-door-premium-storage-blobs-private-link).
98
98
99
99
To deploy this scenario using Terraform, [see this quickstart](https://github.com/Azure/terraform/tree/master/quickstart/101-front-door-premium-storage-blobs-private-link).
100
100
101
-
## Next Steps
101
+
## Next step
102
102
103
103
Learn how to [create an Azure Front Door profile](create-front-door-portal.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/standard-premium/front-door-add-rules-cli.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to create an Azure Front Door Standard/Premium with the A
4
4
author: halkazwini
5
5
ms.author: halkazwini
6
6
ms.service: azure-frontdoor
7
-
ms.topic: sample
7
+
ms.topic: tutorial
8
8
ms.date: 12/30/2021
9
9
ms.custom: devx-track-azurecli
10
10
---
@@ -225,9 +225,9 @@ az afd security-policy create \
225
225
226
226
When you create the Azure Front Door Standard/Premium profile, it takes a few minutes for the configuration to be deployed globally. Once completed, you can access the frontend host you created. In a browser, go to `contoso-frontend.z01.azurefd.net`. Your request will automatically get routed to the nearest server from the specified servers in the origin group.
227
227
228
-
To test instant global failover, we'll use the following steps:
228
+
To test instant global failover, use the following steps:
229
229
230
-
1. Open a browser, as described above, and go to the frontend address: `contoso-frontend.azurefd.net`.
230
+
1. Open a browser, and go to the frontend address: `contoso-frontend.azurefd.net`.
231
231
232
232
2. In the Azure portal, search for and select *App services*. Scroll down to find one of your web apps, **WebAppContoso-1** in this example.
title: Azure Front Door Standard/Premium subscription offers and bandwidth throttling
2
+
title: Standard/Premium Subscription Offers and Bandwidth Throttling
3
+
titleSuffix: Azure Front Door
3
4
description: Learn about Azure Front Door Standard/Premium availability for a specific subscription type.
4
5
author: halkazwini
5
6
ms.author: halkazwini
6
7
manager: kumud
7
8
ms.service: azure-frontdoor
8
-
ms.topic: troubleshooting
9
+
ms.topic: troubleshooting-general
9
10
ms.date: 11/18/2024
10
11
---
11
12
12
-
# Azure Front Door Standard/Premium Subscription Offers and Bandwidth Throttling
13
+
# Azure Front Door Standard/Premium subscription offers and bandwidth throttling
13
14
14
15
**Applies to:**:heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
15
16
16
17
Azure Front Door Standard/Premium profiles are subject to bandwidth throttling based on your subscription type.
17
18
18
-
## Free and Trial Subscriptions
19
+
## Free and trial subscriptions
19
20
20
21
Bandwidth throttling is applied to these subscription types.
21
22
@@ -25,11 +26,11 @@ Bandwidth is throttled until the subscription is verified to be in good standing
25
26
26
27
If throttling persists after payment, you can request removal by [contacting support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade).
27
28
28
-
## Enterprise Agreements
29
+
## Enterprise agreements
29
30
30
31
Refer to the bandwidth limits in [Azure Front Door limits](../../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-standard-and-premium-service-limits).
31
32
32
-
## Other Offer Types
33
+
## Other offer types
33
34
34
35
The same rules as Pay-as-you-go apply to these subscription types:
35
36
@@ -38,6 +39,6 @@ The same rules as Pay-as-you-go apply to these subscription types:
38
39
- Students
39
40
- CSP
40
41
41
-
## Next Steps
42
+
## Next step
42
43
43
44
Learn how to [create an Azure Front Door Standard/Premium profile](create-front-door-portal.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/standard-premium/troubleshoot-cross-origin-resources.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Using Azure Front Door Standard/Premium with Cross-Origin Resource Sharing
2
+
title: Using Azure Front Door with Cross-Origin Resource Sharing
3
3
description: Learn how to use the Azure Front Door (AFD) to with Cross-Origin Resource Sharing (CORS).
4
4
author: halkazwini
5
5
ms.author: qixwang
6
6
ms.service: azure-frontdoor
7
-
ms.topic: how-to
7
+
ms.topic: concept-article
8
8
ms.date: 12/28/2023
9
9
---
10
10
@@ -14,7 +14,7 @@ ms.date: 12/28/2023
14
14
15
15
## What is CORS?
16
16
17
-
CORS (Cross Origin Resource Sharing) is an HTTP feature that enables a web application running under one domain to access resources in another domain. To reduce the possibility of cross-site scripting attacks, all modern web browsers implement a security restriction known as [same-origin policy](https://www.w3.org/Security/wiki/Same_Origin_Policy). This prevents a web page from calling APIs in a different domain. CORS provides a secure way to allow one origin (the origin domain) to call APIs in another origin.
17
+
CORS (Cross Origin Resource Sharing) is an HTTP feature that enables a web application running under one domain to access resources in another domain. To reduce the possibility of cross-site scripting attacks, all modern web browsers implement a security restriction known as [same-origin policy](https://www.w3.org/Security/wiki/Same_Origin_Policy). This prevents a web page from calling APIs in a different domain. CORS provides a secure way to allow one origin (the origin domain) to call APIs in another origin.
18
18
19
19
## How it works
20
20
@@ -48,12 +48,12 @@ A complex request is a CORS request where the browser is required to send a *pre
48
48
>
49
49
50
50
## Wildcard or single origin scenarios
51
-
CORS on Azure Front Door works automatically with no extra configuration when the **Access-Control-Allow-Origin** header is set to wildcard (*) or a single origin. Azure Front Door caches the first response and ensuing requests use the same header.
51
+
CORS on Azure Front Door works automatically with no extra configuration when the **Access-Control-Allow-Origin** header is set to wildcard (*) or a single origin. Azure Front Door caches the first response and ensuing requests use the same header.
52
52
53
53
If requests were sent to the Azure Front Door before CORS being set on your origin, you need to purge content on your endpoint content to reload the content with the **Access-Control-Allow-Origin** header.
54
54
55
55
## Multiple origin scenarios
56
-
If you need to allow a specific list of origins to be allowed for CORS, things get a little more complicated. The problem occurs when the CDN caches the **Access-Control-Allow-Origin** header for the first CORS origin. When a different CORS origin makes another request, the CDN serves the cached **Access-Control-Allow-Origin** header, which doesn't match. There are several ways to correct this problem.
56
+
If you need to allow a specific list of origins to be allowed for CORS, things get a little more complicated. The problem occurs when the CDN caches the **Access-Control-Allow-Origin** header for the first CORS origin. When a different CORS origin makes another request, the CDN serves the cached **Access-Control-Allow-Origin** header, which doesn't match. There are several ways to correct this problem.
57
57
58
58
### Azure Front Door Rule Set
59
59
@@ -62,9 +62,9 @@ On Azure Front Door, you can create a rule in the Azure Front Door [Rules Set](.
62
62
:::image type="content" source="../media/troubleshooting-cross-origin-resource-sharing/cross-origin-resource.png" alt-text="Screenshot of rules example with rule set.":::
63
63
64
64
> [!TIP]
65
-
> You can add additional actions to your rule to modify additional response headers, such as **Access-Control-Allow-Methods**.
65
+
> You can add more actions to your rule to modify other response headers, such as **Access-Control-Allow-Methods**.
66
66
>
67
67
68
-
## Next steps
68
+
## Next step
69
69
70
-
*Learn how to [create a Front Door](create-front-door-portal.md).
70
+
Learn how to [create a Front Door](create-front-door-portal.md).
0 commit comments