Skip to content

Commit da839f0

Browse files
authored
Merge pull request #262077 from MicrosoftDocs/main
12/29/2023 PM Publish
2 parents 95b373d + 258732a commit da839f0

11 files changed

+103
-95
lines changed

articles/frontdoor/billing.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: johndowns
66
ms.service: frontdoor
77
ms.topic: conceptual
88
ms.workload: infrastructure-services
9-
ms.date: 09/06/2022
9+
ms.date: 12/28/2023
1010
ms.author: jodowns
1111
---
1212

@@ -28,7 +28,7 @@ For Azure Front Door pricing information, see [Azure Front Door pricing](https:/
2828
2929
## Base fees
3030

31-
Each Front Door profile incurs an hourly fee. You're billed for each hour, or partial hour, that your profile is deployed. The rate you're charged depends on the Front Door SKU that you deploy.
31+
Each Front Door profile incurs an hourly fee. You're billed for each hour, or partial hour, that your profile is deployed. The rate you're charged depends on the Front Door tier that you deploy.
3232

3333
A single Front Door profile can contain multiple [endpoints](endpoint.md). You're not billed extra for each endpoint.
3434

@@ -44,7 +44,7 @@ Each part of the request process is billed separately:
4444

4545
1. Number of requests from client to Front Door
4646
1. Data transfer from Front Door edge to origin
47-
1. Data transfer from origin to Front Door (non-billable)
47+
1. Data transfer from origin to Front Door (nonbillable)
4848
1. Data transfer from Front Door to client
4949

5050
The following sections describe each of these request components in more detail.
@@ -65,7 +65,7 @@ If the request can be served from the Front Door edge location's cache, Front Do
6565

6666
### Data transfer from origin to Front Door
6767

68-
When your origin server processes a request, it sends data back to Front Door so that it can be returned to the client. This traffic is not billed by Front Door, even if the origin is in a different region to the Front Door edge location for the request.
68+
When your origin server processes a request, it sends data back to Front Door so that it can be returned to the client. This traffic doesn't get billed by Front Door, even if the origin is in a different region to the Front Door edge location for the request.
6969

7070
If your origin is within Azure, the data egress from the Azure origin to Front Door isn't charged. However, you should determine whether those Azure services might bill you to process your requests.
7171

@@ -79,11 +79,11 @@ If a response is compressed, Front Door only charges for the compressed data.
7979

8080
## Private Link origins
8181

82-
When you use the Premium SKU, Front Door can [connect to your origin by using Private Link](private-link.md).
82+
When you use the Premium tier, Front Door can [connect to your origin by using Private Link](private-link.md).
8383

8484
Front Door Premium has a higher base fee and request processing fee. You don't pay extra for Private Link traffic compared to traffic that uses an origin's public endpoint.
8585

86-
When you configure a Private Link origin, you select a region for the private endpoint to use. A [subset of Azure regions support Private Link traffic for Front Door](private-link.md#region-availability). If the region you select is different to the region the origin is deployed to, you won't be charged extra for cross-region traffic. However, the request latency will likely be greater.
86+
When you configure a Private Link origin, you select a region for the private endpoint to use. A [subset of Azure regions support Private Link traffic for Front Door](private-link.md#region-availability). If the region you select is different to the region the origin is deployed to, there isn't an extra charge for cross-region traffic. However, the request latency likely is greater.
8787

8888
## Cross-region traffic
8989

@@ -95,9 +95,9 @@ Front Door charges for traffic from the edge location to the origin. Traffic is
9595

9696
### Example 1: Azure origin without caching
9797

98-
Contoso hosts their website on Azure App Service, which runs in the West US region. Contoso has deployed Front Door with the standard SKU. They have disabled caching.
98+
Contoso hosts their website on Azure App Service, which runs in the West US region. Contoso deployed Front Door with the standard tier. They disabled caching.
9999

100-
Suppose a request from a client in California is sent to the Contoso website, sending a 1 KB request and receiving a 100 KB response:
100+
Suppose a request from a client in California is sent to the Contoso website, sending a 1-KB request and receiving a 100-KB response:
101101

102102
:::image type="content" source="./media/billing/scenario-1.png" alt-text="Diagram of traffic flowing from the client to Azure Front Door and to the origin, without caching or compression." border="false":::
103103

@@ -136,9 +136,9 @@ Suppose a second request arrives at the same Front Door edge location and a vali
136136
The following billing meters are incremented:
137137

138138
| Meter | Incremented by | Billing region |
139-
|-|-|-|
139+
|--|--|--|
140140
| Number of requests from client to Front Door | 1 | North America |
141-
| Data transfer from Front Door edge to origin | *none when request is served from cache* | |
141+
| Data transfer from Front Door edge to origin | *none when request is served from cache* | |
142142
| Data transfer from Front Door to client | 30 KB | North America |
143143

144144
### Example 4: Cross-region traffic
@@ -157,9 +157,9 @@ The following billing meters are incremented:
157157

158158
### Example 5: Non-Azure origin
159159

160-
Fabrikam runs an eCommerce site on another cloud provider. Their site is hosted in Europe. They Azure Front Door to serve the traffic. They haven't enabled caching or compression.
160+
Fabrikam runs an eCommerce site on another cloud provider. Their site is hosted in Europe. They configured Azure Front Door to serve the traffic without caching or compression.
161161

162-
Suppose a request from a client is sent to the Fabrikam website from a client in New York. The client sends a 2 KB request and receives a 350 KB response:
162+
Suppose a request from a client is sent to the Fabrikam website from a client in New York. The client sends a 2-KB request and receives a 350-KB response:
163163

164164
:::image type="content" source="./media/billing/scenario-5.png" alt-text="Diagram of traffic flowing from the client to Azure Front Door and to an origin outside of Azure." border="false":::
165165

@@ -175,11 +175,11 @@ The external cloud provider might charge other fees.
175175

176176
### Example 6: Request blocked by web application firewall
177177

178-
When a request is blocked by the web application firewall (WAF), it isn't sent to the origin. However, Front Door charges the request, and also charges to send a response.
178+
When a request gets blocked by the web application firewall (WAF), it isn't sent to the origin. However, Front Door charges the request, and also charges to send a response.
179179

180-
Suppose a Front Door profile includes a custom WAF rule to block requests from a specific IP address in South America. The WAF is configured with a custom error response page, which is 1 KB in size. If a client from the blocked IP address sends a 1 KB request:
180+
Suppose a Front Door profile includes a custom WAF rule to block requests from a specific IP address in South America. The WAF is configured with a custom error response page, which is 1 KB in size. If a client from the blocked IP address sends a 1-KB request:
181181

182-
:::image type="content" source="./media/billing/scenario-6.png" alt-text="Diagram of traffic flowing from the client to Azure Front Door, where the request is blocked by the WAF." border="false":::
182+
:::image type="content" source="./media/billing/scenario-6.png" alt-text="Diagram of traffic flowing from the client to Azure Front Door, where the request gets blocked by the WAF." border="false":::
183183

184184
The following billing meters are incremented:
185185

articles/frontdoor/create-front-door-bicep.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This quickstart describes how to create an Azure Front Door Standar
44
services: front-door
55
author: duongau
66
ms.author: duau
7-
ms.date: 12/04/2023
7+
ms.date: 12/29/2023
88
ms.topic: quickstart
99
ms.service: frontdoor
1010
ms.workload: infrastructure-services
@@ -29,7 +29,7 @@ This quickstart describes how to use Bicep to create an Azure Front Door Standar
2929

3030
The Bicep file used in this quickstart is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/front-door-standard-premium-app-service-public/).
3131

32-
In this quickstart, you'll create a Front Door Standard/Premium, an App Service, and configure the App Service to validate that traffic has come through the Front Door origin.
32+
In this quickstart, you create a Front Door Standard/Premium, an App Service, and configure the App Service to validate that traffic comes through the Front Door origin.
3333

3434
:::code language="bicep" source="~/quickstart-templates/quickstarts/microsoft.cdn/front-door-standard-premium-app-service-public/main.bicep":::
3535

@@ -90,13 +90,13 @@ You can also use the Azure portal to validate the deployment.
9090

9191
1. Select the resource group that you created in the previous section.
9292

93-
1. Select the Front Door you created and you'll be able to see the endpoint hostname. Copy the hostname and paste it on to the address bar of a browser. Press enter and your request will automatically get routed to the web app.
93+
1. Select the Front Door you created and you're able to see the endpoint hostname. Copy the hostname and paste it on to the address bar of a browser. Press enter and your requests automatically get routed to the web app.
9494

9595
:::image type="content" source="./media/create-front-door-bicep/front-door-bicep-web-app-origin-success.png" alt-text="Screenshot of the message: Your web app is running and waiting for your content.":::
9696

9797
## Clean up resources
9898

99-
When no longer needed, use the Azure portal, Azure CLI, or Azure PowerShell to delete the Front Door service and the resource group. This removes the Front Door and all the related resources.
99+
When no longer needed, use the Azure portal, Azure CLI, or Azure PowerShell to delete the Front Door service and the resource group. The Front Door and all the related resources are removed.
100100

101101
# [CLI](#tab/CLI)
102102

articles/frontdoor/front-door-routing-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: duongau
77
ms.service: frontdoor
88
ms.topic: conceptual
99
ms.workload: infrastructure-services
10-
ms.date: 12/20/2023
10+
ms.date: 12/28/2023
1111
ms.author: jodowns
1212
---
1313

@@ -64,7 +64,7 @@ Profile composite route metric = Route 1 composite route metric + Route 1 compos
6464
```
6565

6666
The calculated metric of 5400 exceeds the limit of 5000, so you can't configure a Front Door profile in this way.
67-
.
67+
6868
## Mitigation
6969

7070
If your profile's composite route metric exceed 5000, consider the following mitigation strategies:

articles/frontdoor/front-door-waf.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
22
title: 'Tutorial: Scale and protect a web app by using Azure Front Door and Azure Web Application Firewall (WAF)'
3-
description: This tutorial will show you how to use Azure Web Application Firewall with the Azure Front Door service.
3+
description: This tutorial shows you how to use Azure Web Application Firewall with the Azure Front Door service.
44
services: frontdoor
55
author: duongau
66
ms.service: frontdoor
77
ms.topic: tutorial
88
ms.workload: infrastructure-services
99
ms.custom: devx-track-azurecli
10-
ms.date: 10/01/2020
10+
ms.date: 12/28/2023
1111
ms.author: duau
1212
---
1313

1414
# Tutorial: Quickly scale and protect a web application by using Azure Front Door and Azure Web Application Firewall (WAF)
1515

16-
Many web applications have experienced a rapid increase of traffic in recent weeks because of COVID-19. These web applications are also experiencing a surge in malicious traffic, including denial-of-service attacks. There's an effective way to both scale out your application for traffic surges and protect yourself from attacks: configure Azure Front Door with Azure WAF as an acceleration, caching, and security layer in front of your web app. This article provides guidance on how to get Azure Front Door with Azure WAF configured for any web app that runs inside or outside of Azure.
16+
Many web applications experience a rapid increase of traffic over time. These web applications are also experiencing a surge in malicious traffic, including denial-of-service attacks. There's an effective way to both scale out your application for traffic surges and protect yourself from attacks: configure Azure Front Door with Azure WAF as an acceleration, caching, and security layer in front of your web app. This article provides guidance on how to get Azure Front Door with Azure WAF configured for any web app that runs inside or outside of Azure.
1717

18-
We'll be using the Azure CLI to configure the WAF in this tutorial. You can accomplish the same thing by using the Azure portal, Azure PowerShell, Azure Resource Manager, or the Azure REST APIs.
18+
We're using the Azure CLI to configure the WAF in this tutorial. You can accomplish the same thing by using the Azure portal, Azure PowerShell, Azure Resource Manager, or the Azure REST APIs.
1919

20-
In this tutorial, you'll learn how to:
20+
In this tutorial, you learn how to:
2121
> [!div class="checklist"]
2222
> - Create a Front Door.
2323
> - Create an Azure WAF policy.
@@ -57,7 +57,7 @@ az network front-door create --backend-address <> --accepted-protocols <> --nam
5757

5858
`--resource-group`: The resource group you want to place this Azure Front Door resource in. To learn more about resource groups, see [Manage resource groups in Azure](../azure-resource-manager/management/manage-resource-groups-portal.md).
5959

60-
In the response you get when you run this command, look for the key `hostName`. You'll need this value in a later step. The `hostName` is the DNS name of the Azure Front Door resource you created.
60+
In the response you get when you run this command, look for the key `hostName`. You need this value in a later step. The `hostName` is the DNS name of the Azure Front Door resource you created.
6161

6262
## Create an Azure WAF profile to use with Azure Front Door resources
6363

@@ -69,12 +69,12 @@ az network front-door waf-policy create --name <> --resource-group <> --disabl
6969

7070
`--resource-group`: The resource group you want to place this WAF resource in.
7171

72-
The preceding CLI code will create a WAF policy that's enabled and that's in prevention mode.
72+
The preceding CLI code creates a WAF policy in prevention mode.
7373

7474
> [!NOTE]
7575
> You might want to create the WAF policy in detection mode and observe how it detects and logs malicious requests (without blocking them) before you decide to use protection mode.
7676
77-
In the response you get when you run this command, look for the key `ID`. You'll need this value in a later step.
77+
In the response you get when you run this command, look for the key `ID`. You need this value in a later step.
7878

7979
The `ID` field should be in this format:
8080

@@ -104,7 +104,7 @@ Add the bot protection rule set:
104104

105105
## Associate the WAF policy with the Azure Front Door resource
106106

107-
In this step, we'll associate the WAF policy we created with the Azure Front Door resource that's in front of your web application:
107+
In this step, we associate the WAF policy we created with the Azure Front Door resource that's in front of your web application:
108108

109109
```azurecli-interactive
110110
az network front-door update --name <> --resource-group <> --set frontendEndpoints[0].webApplicationFirewallPolicyLink='{"id":"<>"}'
@@ -123,7 +123,7 @@ az network front-door update --name <> --resource-group <> --set frontendEndpoin
123123

124124
The custom domain name of your web application is the one that customers use to refer to your application. For example, www.contoso.com. Initially, this custom domain name was pointing to the location where it was running before you introduced Azure Front Door. After you add Azure Front Door and WAF to front the application, the DNS entry that corresponds to that custom domain should point to the Azure Front Door resource. You can make this change by remapping the entry in your DNS server to the Azure Front Door `hostName` you noted when you created the Azure Front Door resource.
125125

126-
Specific steps to update your DNS records will depend on your DNS service provider. If you use Azure DNS to host your DNS name, you can refer to the documentation for [steps to update a DNS record](../dns/dns-operations-recordsets-cli.md) and point to the Azure Front Door `hostName`.
126+
Specific steps to update your DNS records depend on your DNS service provider. If you use Azure DNS to host your DNS name, you can refer to the documentation for [steps to update a DNS record](../dns/dns-operations-recordsets-cli.md) and point to the Azure Front Door `hostName`.
127127

128128
There's one important thing to note if you need your customers to get to your website using the zone apex (for example, contoso.com). In this case, you have to use Azure DNS and its [alias record type](../dns/dns-alias.md) to host your DNS name.
129129

@@ -133,7 +133,7 @@ Finally, if you're using a custom domain to reach your web application and want
133133

134134
## Lock down your web application
135135

136-
We recommend you ensure only Azure Front Door edges can communicate with your web application. Doing so will ensure no one can bypass the Azure Front Door protection and access your application directly. To accomplish this lockdown, see [How do I lock down the access to my backend to only Azure Front Door?](./front-door-faq.yml#what-are-the-steps-to-restrict-the-access-to-my-backend-to-only-azure-front-door-).
136+
We recommend you ensure only Azure Front Door edges can communicate with your web application. Doing so ensures no one can bypass the Azure Front Door protection and access your application directly. To accomplish this lockdown, see [How do I lock down the access to my backend to only Azure Front Door?](./front-door-faq.yml#what-are-the-steps-to-restrict-the-access-to-my-backend-to-only-azure-front-door-).
137137

138138
## Clean up resources
139139

0 commit comments

Comments
 (0)