Skip to content

Commit 9351e14

Browse files
committed
updates by reviewer
1 parent 330e78c commit 9351e14

1 file changed

Lines changed: 37 additions & 45 deletions

File tree

articles/frontdoor/high-availability.md

Lines changed: 37 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-frontdoor
88
ms.topic: concept-article
9-
ms.date: 01/23/2026
9+
ms.date: 01/28/2026
1010

1111
#customer intent: As a cloud architect, I want to implement a manual failover strategy for Azure Front Door using Azure Traffic Manager so that I can ensure high availability during service interruptions.
1212
---
@@ -39,35 +39,35 @@ When implementing high availability architectures for production workloads, cons
3939

4040
- **Don't configure the primary Azure Traffic Manager for automatic failover:** Azure Traffic Manager health probes originate only from US-based Azure regions. Because of this, when probing Front Door endpoints (or any CDN using anycast routing), these US-based probes will almost always reach US POPs, leaving the health of non-US POPs unverified. This prevents Traffic Manager from automatically failing over between Azure Front Door and another ingress service based on the true global health of anycast CDN such as Front Door. As such, for global workloads requiring health validation from multiple geographies, manual failover with weighted routing and monitoring disabled provides more reliable control than automated health-based routing.
4141

42-
- **Certificates:** If you're currently using Front Door-managed certifications, you must migrate to BYO certificates. By using your own certificate, you can keep the TLS certificates consistent regardless of which ingress path the traffic follows. Ensure that your TLS certificates are compatible with Azure Front Door. For more information, see [Configure HTTPS on an Azure Front Door custom domain](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain).
42+
- **Certificates:** If you're currently using Front Door-managed certifications, you must migrate to BYO certificates. By using your own certificate, you can keep the TLS certificates consistent regardless of which ingress path the traffic follows. Ensure that your TLS certificates are compatible with Azure Front Door. For more information, see [Configure HTTPS on an Azure Front Door custom domain](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain) and [TLS encryption with Azure Front Door](/azure/frontdoor/end-to-end-tls).
4343

44-
- Always test failover procedures in non-production environments first.
44+
- Always test failover procedures ahead of time in non-production environments first.
4545

46-
- **Traffic Manager doesn't support CNAME flattening at the DNS zone apex (root domain):** If you require Traffic Manager at the apex, you must use DNS providers that support alias records or similar mechanisms.
46+
- **Traffic Manager doesn't support CNAME flattening at the DNS zone apex (root domain):** If you require Traffic Manager at the apex, you must use DNS providers that support alias records or similar mechanisms. [Azure DNS](/azure/dns/dns-alias) is one such DNS provider.
4747

48-
- Use short DNS TTLs (300 - 600 seconds) and monitor DNS TTL propagation times with your user base before setting aggressive TTLs.
48+
- Use short DNS TTLs (300 - 600 seconds) and monitor DNS TTL propagation times.
4949

50-
- **Security:** Lock down Application Gateway with NSGs/ACLs (allow required platform ranges and inbound application ports) and keep origins secured for all ingress paths. For more information, see [Configure network security groups for your Application Gateway](/azure/application-gateway/configuration-infrastructure#network-security-groups).
50+
- **Security:** Lock down Application Gateway with network security groups (NSGs)/ACLs (allow required platform ranges and inbound application ports) and keep origins secured for all ingress paths. For more information, see [Configure network security groups for your Application Gateway](/azure/application-gateway/configuration-infrastructure#network-security-groups). While Application Gateway WAF mitigates HTTP/L7 attacks, NSGs provide packet filtering only and don't protect against volumetric or protocol level (L3/L4) DDoS attacks. All Azure public endpoints benefit from baseline, always on Azure platform DDoS protection, which is designed to protect the Azure infrastructure but doesn't include workload specific tuning, telemetry, cost protection, or availability guarantees. For production and mission critical workloads, consider Azure DDoS Network Protection to protect Application Gateway public IPs. For more information, see [Azure DDoS Protection pricing](https://azure.microsoft.com/pricing/details/ddos-protection/#:~:text=When%20Azure%20Application%20Gateway%20with%20WAF%20is%20deployed%20in%20a%20protected%20virtual%20network%2C%20there%20are%20no%20additional%20charges%20for%20WAF%20-%20you%20pay%20for%20the%20Application%20Gateway%20at%20the%20lower%20non-WAF%20rate) for more details.
5151

5252
- Document WAF rule differences between Front Door and failover solutions.
5353

54-
- **Origin security consideration:** For production environments, consider using `X-Azure-FDID` header validation and IP address filtering for enhanced origin security. For more information, see [Secure traffic to Azure Front Door origins](/azure/frontdoor/origin-security?tabs=app-service-functions&pivots=front-door-standard-premium#public-ip-address-based-origins). **Private Link is not recommended for these HA architectures** because alternative CDNs can't access origins protected by Front Door Private Link, and Application Gateway requires additional virtual network/Private Endpoint configuration to access private origins, and can't use Front Door's native Private Link integration.
54+
- **Origin security consideration:** Private Link is not recommended for these HA architectures because alternate CDN platforms can't access origins protected by Azure Front Door's Private Link integration. Additionally, Application Gateway requires extra virtual network and Private Endpoint configuration to reach private origins and can't leverage Front Door's native Private Link capabilities. For production environments utilizing Azure Front Door alongside other CDN providers, consider using alternative, CDN‑agnostic origin‑security controls such as token‑based origin authentication (HMAC or signed URLs), mutual TLS (mTLS), custom origin headers, and IP address filtering to enforce origin trust when Private Link or `X‑Azure‑FDID` validation can't be used.
5555

5656
- **Edit the sample commands listed in this guide so that they are tailored to your environment for automation and runbooks.**
5757

5858
- Establish clear runbooks and test failover and failback procedures.
5959

6060
- Configure comprehensive monitoring and alerting for all endpoints.
6161

62-
- Plan for gradual traffic shifting during failover to validate functionality.
62+
- Validate functionality during failover to alternate ingress solutions.
6363

6464
- Test certificate renewal processes across all platforms.
6565

6666
- Regularly validate that failover endpoints remain functional (quarterly testing recommended).
6767

68-
> [!NOTE]
69-
> - This guide uses Azure CLI sample commands executed from within PowerShell.
70-
> - Before proceeding, review the [Global routing redundancy for mission-critical web applications](/azure/architecture/guide/networking/global-web-applications/overview?tabs=cli).
68+
- This guide uses Azure CLI sample commands executed from within PowerShell.
69+
70+
- Before proceeding, review the [Global routing redundancy for mission-critical web applications](/azure/architecture/guide/networking/global-web-applications/overview).
7171

7272
## Scenario 1: Traffic Manager failover: Front Door to Application Gateway WAF
7373

@@ -77,14 +77,14 @@ This DNS-based load balancing solution uses multiple Azure Traffic Manager profi
7777

7878
**Traffic flow (Normal operation):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve routing) → Front Door (Priority 1) → Origin Servers.
7979

80-
**Traffic flow (Front Door failure):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve @copilot routing) → Secondary Traffic Manager (Priority mode) → Application Gateway(s) → Origin Servers.
80+
**Traffic flow (Front Door failure):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve routing) → Secondary Traffic Manager (Priority mode) → Application Gateway(s) → Origin Servers.
8181

8282
### Pre-deployment: Front Door vs Application Gateway
8383

8484
It's important to understand the feature differences between Front Door and Application Gateway WAF in case you're utilizing any features Application Gateway WAF doesn't offer. The following two tables provide an overview.
8585

8686
> [!IMPORTANT]
87-
> This solution assumes you are currently using Azure Front Door to serve traffic across multiple regions or globally. In this design, the steps below introduce a **secondary Azure Traffic Manager configured with Performance routing between the primary Traffic Manager and regional Application Gateway instances**. This approach is necessary because Azure Front Door is a global Layer‑7 service, so the secondary Traffic Manager effectively replaces Front Door's global latency‑based routing by acting as the global load‑balancing layer. As a result, **Traffic Manager preserves latency‑optimized user routing for a geographically distributed audience**. Given this architectural shift, **you must evaluate global traffic patterns and deploy Application Gateway instances in regions that have meaningful user volume to ensure optimal performance and resilience**.
87+
> This solution assumes you're currently using Azure Front Door to serve traffic across multiple regions or globally. In this design, the steps below introduce a **secondary Azure Traffic Manager configured with Performance routing between the primary Traffic Manager and regional Application Gateway instances**. This approach is necessary because Azure Front Door is a global Layer‑7 service, so the secondary Traffic Manager effectively replaces Front Door's global latency‑based routing by acting as the global load‑balancing layer. As a result, **Traffic Manager preserves latency‑optimized user routing for a geographically distributed audience**. Given this architectural shift, **you must evaluate global traffic patterns and deploy Application Gateway instances in regions that have meaningful user volume to ensure optimal performance and resilience**.
8888
8989
#### Features differences
9090

@@ -136,48 +136,40 @@ It's important to understand the feature differences between Front Door and Appl
136136

137137
### Recommendations
138138

139-
- Maintain separate custom rule sets. Use Front Door rules as baseline.
139+
- Because you must maintain distinct rule sets for each WAF, use the Front Door rule set as your baseline. Create an Application Gateway rule set that matches the Front Door rule set as closely as possible.
140140
- Test Application Gateway WAF separately and independently.
141141
- Document all custom exclusions for both platforms.
142142
- Regularly audit rule sets for consistency.
143+
- Adhere to the network guidance within [Azure Application Gateway infrastructure configuration](/azure/application-gateway/configuration-infrastructure) specially. Ensure to exercise the following:
143144

144-
### Network planning
145-
146-
The following are virtual network and subnet requirements:
147-
148-
#### Subnet sizing (per region)
149-
150-
- Minimum: /27 (32 addresses)
151-
152-
- Recommended: /24 (256 addresses) for autoscaling and hitless maintenance
153-
154-
- Formula: (max instances \* 10) + 5 Azure reserved IPs
155-
156-
- Example: 20 max instances → (20 \* 10) + 5 = 205 IPs → use /24
157-
158-
#### Connectivity to origins
159-
160-
- Virtual network peering: For origins in different VNets
161-
162-
- ExpressRoute/VPN: For on-premises origins
145+
- **Network planning:** The following are virtual network and subnet requirements:
163146

164-
- Public internet: For SaaS/cloud origins with proper security
147+
- **Subnet sizing (per region):**
165148

166-
#### Securing Application Gateway
149+
- Minimum: /27 (32 addresses)
150+
151+
- Recommended: /24 (256 addresses) for autoscaling and hitless maintenance
152+
153+
- Formula: (max instances \* 10) + 5 Azure reserved IPs
154+
155+
- Example: 20 max instances → (20 \* 10) + 5 = 205 IPs → use /24
167156

168-
- Dedicated subnet for Application Gateway (no other resources)
169157

170-
- **Inbound allows:**
158+
- **Securing Application Gateway:**
171159

172-
- 443/80 from Internet (or specific source ranges)
160+
- Dedicated subnet for Application Gateway (no other resources)
173161

174-
- 65200-5535 from GatewayManager (Application Gateway v2)
162+
- **Inbound allows:**
175163

176-
- AzureLoadBalancer
164+
- 443/80 from Internet (or specific source ranges)
165+
166+
- 65200-5535 from GatewayManager (Application Gateway v2)
167+
168+
- AzureLoadBalancer
177169

178-
- Block other inbound. Don't block required outbound internet
170+
- Block other inbound. Don't block required outbound internet
179171

180-
- Use ASGs for backend segmentation and least-privilege rules
172+
- Use ASGs for backend segmentation and least-privilege rules
181173

182174
> [!NOTE]
183175
> For capacity planning and autoscaling strategy, see [Architecture best practices for Azure Application Gateway v2](/azure/well-architected/service-guides/azure-application-gateway).
@@ -206,7 +198,7 @@ The following are virtual network and subnet requirements:
206198
1. Create managed identity and grant Key Vault access. For more information, see [TLS termination with Key Vault certificates](/azure/application-gateway/key-vault-certs).
207199

208200
> [!NOTE]
209-
> Application Gateway requires the SSL/TLS certificate in PFX format with private key. The certificate must be accessible from Azure Key Vault or uploaded directly. Use the same Front Door certificate to ensure consistent TLS behavior.
201+
> Application Gateway requires the SSL/TLS certificate in PFX format with private key. The certificate must be accessible from Azure Key Vault or uploaded directly. Use the same certificate that Front Door uses to ensure consistent TLS behavior.
210202
211203
1. Create WAF policy. For more information, see [Create Web Application Firewall policies for Application Gateway](/azure/web-application-firewall/ag/create-waf-policy-ag)
212204

@@ -325,7 +317,7 @@ The following are virtual network and subnet requirements:
325317
326318
> [!WARNING]
327319
> **Potential service impact:** The following steps will redirect your production traffic from Front Door directly to Traffic Manager. Before proceeding:
328-
> - **Test these steps in a non-production environment first**.
320+
> - **Test these steps in a non-production environment first** (for example, by temporarily modifying the local `hosts` file on a non‑production workstation to resolve the custom domain to the Traffic Manager endpoint, allowing validation without affecting live traffic).
329321
> - **Reduce your DNS CNAME TTL to the lowest value possible** (for example, 60-300 seconds) at least 24-48 hours before making changes.
330322
> - **Plan for a maintenance window** during low-traffic periods if possible.
331323
> - **Have rollback procedures ready** in case issues arise.
@@ -459,7 +451,7 @@ The following are virtual network and subnet requirements:
459451
> [!NOTE]
460452
> The response headers can help identify the serving endpoint:
461453
> - Front Door includes `x-azure-ref` header.
462-
> - Application Gateway includes `Server: Microsoft-IIS` or similar.
454+
> - Traffic that passes through Application Gateway might include `Server: Microsoft-IIS` or similar.
463455
464456
## Scenario 2: Traffic Manager failover: Front Door to alternative CDN
465457

0 commit comments

Comments
 (0)