Skip to content

Commit da34cf1

Browse files
committed
freshness review - 8/12
1 parent cf86388 commit da34cf1

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

articles/frontdoor/private-link.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: frontdoor
55
author: duongau
66
ms.service: azure-frontdoor
77
ms.topic: conceptual
8-
ms.date: 05/17/2023
8+
ms.date: 08/12/2024
99
ms.author: duau
1010
ms.custom: references_regions
1111
---
@@ -20,26 +20,26 @@ Azure Front Door Premium can connect to your origin using Private Link. Your ori
2020

2121
## How Private Link works
2222

23-
When you enable Private Link to your origin in Azure Front Door Premium, Front Door creates a private endpoint on your behalf from an Azure Front Door managed regional private network. You'll receive an Azure Front Door private endpoint request at the origin pending your approval.
23+
When you enable Private Link to your origin in Azure Front Door Premium, Front Door creates a private endpoint on your behalf from an Azure Front Door managed regional private network. You receive an Azure Front Door private endpoint request at the origin pending your approval.
2424

2525
> [!IMPORTANT]
2626
> You must approve the private endpoint connection before traffic can pass to the origin privately. You can approve private endpoint connections by using the Azure portal, Azure CLI, or Azure PowerShell. For more information, see [Manage a Private Endpoint connection](../private-link/manage-private-endpoint.md).
2727
28-
After you enable an origin for Private Link and approve the private endpoint connection, it can take a few minutes for the connection to be established. During this time, requests to the origin will receive an Azure Front Door error message. The error message will go away once the connection is established.
28+
After you enable an origin for Private Link and approve the private endpoint connection, it can take a few minutes for the connection to be established. During this time, requests to the origin receives an Azure Front Door error message. The error message goes away once the connection is established.
2929

30-
Once your request is approved, a private IP address gets assigned from the Azure Front Door managed virtual network. Traffic between your Azure Front Door and your origin will communicate using the established private link over the Microsoft backbone network. Incoming traffic to your origin is now secured when arriving at your Azure Front Door.
30+
Once your request is approved, a private IP address gets assigned from the Azure Front Door managed virtual network. Traffic between your Azure Front Door and your origin communicates using the established private link over the Microsoft backbone network. Incoming traffic to your origin is now secured when arriving at your Azure Front Door.
3131

3232
:::image type="content" source="./media/private-link/enable-private-endpoint.png" alt-text="Screenshot of enable Private Link service checkbox from origin configuration page.":::
3333

3434
## Association of a private endpoint with an Azure Front Door profile
3535

3636
### Private endpoint creation
3737

38-
Within a single Azure Front Door profile, if two or more Private Link enabled origins are created with the same set of Private Link, resource ID and group ID, then for all such origins only one private endpoint gets created. Connections to the backend can be enabled using this private endpoint. This setup means you only have to approve the private endpoint once because only one private endpoint gets created. If you create more Private Link enabled origins using the same set of Private Link location, resource ID and group ID, you won't need to approve anymore private endpoints.
38+
Within a single Azure Front Door profile, if two or more Private Link enabled origins are created with the same set of Private Link, resource ID and group ID, then for all such origins only one private endpoint gets created. Connections to the backend can be enabled using this private endpoint. This setup means you only have to approve the private endpoint once because only one private endpoint gets created. If you create more Private Link enabled origins using the same set of Private Link location, resource ID, and group ID, you don't need to approve anymore private endpoints.
3939

4040
#### Single private endpoint
4141

42-
For example, a single private endpoint gets created for all the different origins across different origin groups but in the same Azure Front Door profile as shown in the below table:
42+
For example, a single private endpoint gets created for all the different origins across different origin groups but in the same Azure Front Door profile as shown in the following table:
4343

4444
:::image type="content" source="./media/private-link/single-endpoint.png" alt-text="Diagram showing a single private endpoint created for origins created in the same Azure Front Door profile.":::
4545

@@ -63,30 +63,30 @@ A new private endpoint gets created in the following scenario:
6363
6464
### Private endpoint removal
6565

66-
When an Azure Front Door profile gets deleted, private endpoints associated with the profile will also get deleted.
66+
When an Azure Front Door profile gets deleted, private endpoints associated with the profile also get deleted.
6767

6868
#### Single private endpoint
6969

70-
If AFD-Profile-1 gets deleted, then the PE1 private endpoint across all the origins will also be deleted.
70+
If AFD-Profile-1 gets deleted, then the PE1 private endpoint across all the origins also gets deleted.
7171

72-
:::image type="content" source="./media/private-link/delete-endpoint.png" alt-text="Diagram showing if AFD-Profile-1 gets deleted then PE1 across all origins will get deleted.":::
72+
:::image type="content" source="./media/private-link/delete-endpoint.png" alt-text="Diagram showing if AFD-Profile-1 gets deleted then PE1 across all origins get deleted.":::
7373

7474
#### Multiple private endpoints
7575

76-
* If AFD-Profile-1 gets deleted, all private endpoints from PE1 through to PE4 will be deleted.
76+
* If AFD-Profile-1 gets deleted, all private endpoints from PE1 through to PE4 gets deleted.
7777

7878
:::image type="content" source="./media/private-link/delete-multiple-endpoints.png" alt-text="Diagram showing if AFD-Profile-1 gets deleted, all private endpoints from PE1 through PE4 gets deleted.":::
7979

80-
* Deleting a Front Door profile won't affect private endpoints created for a different Front Door profile.
80+
* Deleting an Azure Front Door profile doesn't affect private endpoints created for a different Front Door profile.
8181

82-
:::image type="content" source="./media/private-link/delete-multiple-profiles.png" alt-text="Diagram showing Azure Front Door profile getting deleted won't affect private endpoints in other Front Door profiles.":::
82+
:::image type="content" source="./media/private-link/delete-multiple-profiles.png" alt-text="Diagram showing Azure Front Door profile getting deleted but doesn't affect private endpoints in other Front Door profiles.":::
8383

8484
For example:
8585

86-
* If AFD-Profile-2 gets deleted, only PE5 will be removed.
87-
* If AFD-Profile-3 gets deleted, only PE6 will be removed.
88-
* If AFD-Profile-4 gets deleted, only PE7 will be removed.
89-
* If AFD-Profile-5 gets deleted, only PE8 will be removed.
86+
* If AFD-Profile-2 gets deleted, only PE5 is removed.
87+
* If AFD-Profile-3 gets deleted, only PE6 is removed.
88+
* If AFD-Profile-4 gets deleted, only PE7 is removed.
89+
* If AFD-Profile-5 gets deleted, only PE8 is removed.
9090

9191
## Region availability
9292

@@ -101,8 +101,8 @@ Azure Front Door private link is available in the following regions:
101101
| East US 2 | UK South | | East Asia |
102102
| South Central US | West Europe | | |
103103
| West US 3 | Sweden Central | | |
104-
| US Gov Arizona |||
105-
| US Gov Texas |||
104+
| US Gov Arizona | | | |
105+
| US Gov Texas | | | |
106106

107107

108108
## Limitations
@@ -112,7 +112,7 @@ Origin support for direct private endpoint connectivity is currently limited to:
112112
* Web App
113113
* Internal load balancers, or any services that expose internal load balancers such as Azure Kubernetes Service, Azure Container Apps or Azure Red Hat OpenShift
114114
* Storage Static Website
115-
* Application Gateway (Preview only. Please do not put production workloads)
115+
* Application Gateway (Preview only. Don't use in production environments)
116116

117117
> [!NOTE]
118118
> * This feature isn't supported with Azure App Service Slots or Functions.

0 commit comments

Comments
 (0)