Skip to content

Commit dc27357

Browse files
committed
corrections
1 parent a7ac82a commit dc27357

File tree

5 files changed

+26
-25
lines changed

5 files changed

+26
-25
lines changed

articles/frontdoor/scenario-storage-blobs.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure Front Door enhances the delivery of static content from Azure Storage blob
1818

1919
In this reference architecture, a storage account and an Azure Front Door profile with a single origin are deployed.
2020

21-
## Dataflow
21+
## Data flow
2222

2323
The data flows through the scenario as follows:
2424

@@ -40,7 +40,7 @@ The data flows through the scenario as follows:
4040

4141
If you store static files with another cloud storage provider or on your own infrastructure, this scenario still largely applies. However, you need to ensure that incoming traffic to your origin server is verified to come through Front Door. If your storage provider doesn't support Private Link, consider using an alternative approach like [allowlisting the Front Door service tag and inspecting the `X-Azure-FDID` header](origin-security.md).
4242

43-
## Scenario Details
43+
## Scenario details
4444

4545
Static content delivery is beneficial in many situations, such as:
4646
- Delivering images, CSS files, and JavaScript files for a web application.
@@ -53,7 +53,7 @@ In complex scenarios, a single Front Door profile can serve both static and dyna
5353

5454
## Considerations
5555

56-
### Scalability and Performance
56+
### Scalability and performance
5757

5858
Azure Front Door acts as a content delivery network (CDN), caching content at its globally distributed PoPs. When a cached response is available, Azure Front Door quickly serves it, enhancing performance and reducing the load on the origin. If the PoP lacks a valid cached response, Azure Front Door's traffic acceleration capabilities expedite content delivery from the origin.
5959

@@ -63,12 +63,12 @@ Azure Front Door acts as a content delivery network (CDN), caching content at it
6363

6464
Azure Front Door is designed for internet-facing scenarios and is optimized for publicly accessible blobs. To authenticate access to blobs, consider using [shared access signatures (SAS)](../storage/common/storage-sas-overview.md). Ensure you enable the [*Use Query String* behavior](front-door-caching.md#query-string-behavior) to prevent Azure Front Door from serving requests to unauthenticated clients. This approach might limit the effectiveness of caching, as each request with a different SAS must be sent to the origin.
6565

66-
#### Origin Security
66+
#### Origin security
6767

68-
- If you are using the premium tier, Azure Front Door can connect securely to the Azure Storage account using [Private Link](private-link.md). The storage account can be configured to deny public network access, allowing requests only through the private endpoint used by Azure Front Door. This setup ensures all requests get processed by Azure Front Door, protecting your storage account from direct internet exposure.
69-
- If you are using the standard tier, you can secure requests with a [shared access signature (SAS)](../storage/common/storage-sas-overview.md) and either have clients include the SAS in their requests or use the Azure Front Door [rules engine](front-door-rules-engine.md) to attach it. Note that the storage account's network access must be publicly accessible (from all networks or from Front Door IP addresses in AzureFrontDoor.Backend service tag).
68+
- If you're using the premium tier, Azure Front Door can connect securely to the Azure Storage account using [Private Link](private-link.md). The storage account can be configured to deny public network access, allowing requests only through the private endpoint used by Azure Front Door. This setup ensures all requests get processed by Azure Front Door, protecting your storage account from direct internet exposure.
69+
- If you're using the standard tier, you can secure requests with a [shared access signature (SAS)](../storage/common/storage-sas-overview.md) and either have clients include the SAS in their requests or use the Azure Front Door [rules engine](front-door-rules-engine.md) to attach it. The storage account's network access must be publicly accessible (from all networks or from Front Door IP addresses in `AzureFrontDoor.Backend` service tag).
7070

71-
#### Custom Domain Names
71+
#### Custom domain names
7272

7373
Azure Front Door supports custom domain names and can manage TLS certificates for these domains. Using custom domains ensures clients receive files from a trusted source, with TLS encrypting every connection to Azure Front Door. Azure Front Door's management of TLS certificates helps avoid outages and security issues from invalid or outdated certificates.
7474

@@ -86,18 +86,18 @@ Using the Azure Front Door cache reduces the load on your storage account. If yo
8686

8787
To further improve resiliency, consider the redundancy of your storage account. For more information, see [Azure Storage redundancy](../storage/common/storage-redundancy.md). Alternatively, deploy multiple storage accounts and configure multiple origins in your Azure Front Door origin group. Set up fail over between origins by configuring each origin's priority. For more information, see [Origins and origin groups in Azure Front Door](origin.md).
8888

89-
### Cost Optimization
89+
### Cost optimization
9090

9191
Caching helps reduce the cost of delivering static content. Azure Front Door's PoPs store copies of responses and can deliver these cached responses for subsequent requests, reducing the request load on the origin. In high-scale static content solutions, especially those delivering large files, caching can significantly reduce traffic costs.
9292

9393
To use Private Link in this solution, deploy the premium tier of Azure Front Door. The standard tier can be used if you don't need to block direct traffic to your storage account. For more information, see [Origin security](#origin-security).
9494

95-
## Deploy This Scenario
95+
## Deploy this scenario
9696

9797
To deploy this scenario using Bicep or JSON ARM templates, [see this quickstart](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.cdn/front-door-premium-storage-blobs-private-link).
9898

9999
To deploy this scenario using Terraform, [see this quickstart](https://github.com/Azure/terraform/tree/master/quickstart/101-front-door-premium-storage-blobs-private-link).
100100

101-
## Next Steps
101+
## Next step
102102

103103
Learn how to [create an Azure Front Door profile](create-front-door-portal.md).

articles/frontdoor/scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article explains how Front Door can help you to build a well a
44
author: johndowns
55
ms.author: jodowns
66
ms.service: azure-frontdoor
7-
ms.topic: conceptual
7+
ms.topic: concept-article
88
ms.date: 02/13/2023
99
---
1010

articles/frontdoor/standard-premium/front-door-add-rules-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create an Azure Front Door Standard/Premium with the A
44
author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-frontdoor
7-
ms.topic: sample
7+
ms.topic: tutorial
88
ms.date: 12/30/2021
99
ms.custom: devx-track-azurecli
1010
---
Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
title: Azure Front Door Standard/Premium subscription offers and bandwidth throttling
2+
title: Standard/Premium Subscription Offers and Bandwidth Throttling
3+
titleSuffix: Azure Front Door
34
description: Learn about Azure Front Door Standard/Premium availability for a specific subscription type.
45
author: halkazwini
56
ms.author: halkazwini
@@ -9,13 +10,13 @@ ms.topic: troubleshooting
910
ms.date: 11/18/2024
1011
---
1112

12-
# Azure Front Door Standard/Premium Subscription Offers and Bandwidth Throttling
13+
# Azure Front Door Standard/Premium subscription offers and bandwidth throttling
1314

1415
**Applies to:** :heavy_check_mark: Front Door Standard :heavy_check_mark: Front Door Premium
1516

1617
Azure Front Door Standard/Premium profiles are subject to bandwidth throttling based on your subscription type.
1718

18-
## Free and Trial Subscriptions
19+
## Free and trial subscriptions
1920

2021
Bandwidth throttling is applied to these subscription types.
2122

@@ -25,11 +26,11 @@ Bandwidth is throttled until the subscription is verified to be in good standing
2526

2627
If throttling persists after payment, you can request removal by [contacting support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade).
2728

28-
## Enterprise Agreements
29+
## Enterprise agreements
2930

3031
Refer to the bandwidth limits in [Azure Front Door limits](../../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-standard-and-premium-service-limits).
3132

32-
## Other Offer Types
33+
## Other offer types
3334

3435
The same rules as Pay-as-you-go apply to these subscription types:
3536

@@ -38,6 +39,6 @@ The same rules as Pay-as-you-go apply to these subscription types:
3839
- Students
3940
- CSP
4041

41-
## Next Steps
42+
## Next step
4243

4344
Learn how to [create an Azure Front Door Standard/Premium profile](create-front-door-portal.md).

articles/frontdoor/standard-premium/troubleshoot-cross-origin-resources.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use the Azure Front Door (AFD) to with Cross-Origin Re
44
author: halkazwini
55
ms.author: qixwang
66
ms.service: azure-frontdoor
7-
ms.topic: how-to
7+
ms.topic: concept-article
88
ms.date: 12/28/2023
99
---
1010

@@ -14,7 +14,7 @@ ms.date: 12/28/2023
1414

1515
## What is CORS?
1616

17-
CORS (Cross Origin Resource Sharing) is an HTTP feature that enables a web application running under one domain to access resources in another domain. To reduce the possibility of cross-site scripting attacks, all modern web browsers implement a security restriction known as [same-origin policy](https://www.w3.org/Security/wiki/Same_Origin_Policy). This prevents a web page from calling APIs in a different domain. CORS provides a secure way to allow one origin (the origin domain) to call APIs in another origin.
17+
CORS (Cross Origin Resource Sharing) is an HTTP feature that enables a web application running under one domain to access resources in another domain. To reduce the possibility of cross-site scripting attacks, all modern web browsers implement a security restriction known as [same-origin policy](https://www.w3.org/Security/wiki/Same_Origin_Policy). This prevents a web page from calling APIs in a different domain. CORS provides a secure way to allow one origin (the origin domain) to call APIs in another origin.
1818

1919
## How it works
2020

@@ -48,12 +48,12 @@ A complex request is a CORS request where the browser is required to send a *pre
4848
>
4949
5050
## Wildcard or single origin scenarios
51-
CORS on Azure Front Door works automatically with no extra configuration when the **Access-Control-Allow-Origin** header is set to wildcard (*) or a single origin. Azure Front Door caches the first response and ensuing requests use the same header.
51+
CORS on Azure Front Door works automatically with no extra configuration when the **Access-Control-Allow-Origin** header is set to wildcard (*) or a single origin. Azure Front Door caches the first response and ensuing requests use the same header.
5252

5353
If requests were sent to the Azure Front Door before CORS being set on your origin, you need to purge content on your endpoint content to reload the content with the **Access-Control-Allow-Origin** header.
5454

5555
## Multiple origin scenarios
56-
If you need to allow a specific list of origins to be allowed for CORS, things get a little more complicated. The problem occurs when the CDN caches the **Access-Control-Allow-Origin** header for the first CORS origin. When a different CORS origin makes another request, the CDN serves the cached **Access-Control-Allow-Origin** header, which doesn't match. There are several ways to correct this problem.
56+
If you need to allow a specific list of origins to be allowed for CORS, things get a little more complicated. The problem occurs when the CDN caches the **Access-Control-Allow-Origin** header for the first CORS origin. When a different CORS origin makes another request, the CDN serves the cached **Access-Control-Allow-Origin** header, which doesn't match. There are several ways to correct this problem.
5757

5858
### Azure Front Door Rule Set
5959

@@ -62,9 +62,9 @@ On Azure Front Door, you can create a rule in the Azure Front Door [Rules Set](.
6262
:::image type="content" source="../media/troubleshooting-cross-origin-resource-sharing/cross-origin-resource.png" alt-text="Screenshot of rules example with rule set.":::
6363

6464
> [!TIP]
65-
> You can add additional actions to your rule to modify additional response headers, such as **Access-Control-Allow-Methods**.
65+
> You can add more actions to your rule to modify other response headers, such as **Access-Control-Allow-Methods**.
6666
>
6767
68-
## Next steps
68+
## Next step
6969

70-
* Learn how to [create a Front Door](create-front-door-portal.md).
70+
Learn how to [create a Front Door](create-front-door-portal.md).

0 commit comments

Comments
 (0)