You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/high-availability.md
+37-45Lines changed: 37 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: azure-frontdoor
8
8
ms.topic: concept-article
9
-
ms.date: 01/23/2026
9
+
ms.date: 01/28/2026
10
10
11
11
#customer intent: As a cloud architect, I want to implement a manual failover strategy for Azure Front Door using Azure Traffic Manager so that I can ensure high availability during service interruptions.
12
12
---
@@ -39,35 +39,35 @@ When implementing high availability architectures for production workloads, cons
39
39
40
40
-**Don't configure the primary Azure Traffic Manager for automatic failover:** Azure Traffic Manager health probes originate only from US-based Azure regions. Because of this, when probing Front Door endpoints (or any CDN using anycast routing), these US-based probes will almost always reach US POPs, leaving the health of non-US POPs unverified. This prevents Traffic Manager from automatically failing over between Azure Front Door and another ingress service based on the true global health of anycast CDN such as Front Door. As such, for global workloads requiring health validation from multiple geographies, manual failover with weighted routing and monitoring disabled provides more reliable control than automated health-based routing.
41
41
42
-
-**Certificates:** If you're currently using Front Door-managed certifications, you must migrate to BYO certificates. By using your own certificate, you can keep the TLS certificates consistent regardless of which ingress path the traffic follows. Ensure that your TLS certificates are compatible with Azure Front Door. For more information, see [Configure HTTPS on an Azure Front Door custom domain](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain).
42
+
-**Certificates:** If you're currently using Front Door-managed certifications, you must migrate to BYO certificates. By using your own certificate, you can keep the TLS certificates consistent regardless of which ingress path the traffic follows. Ensure that your TLS certificates are compatible with Azure Front Door. For more information, see [Configure HTTPS on an Azure Front Door custom domain](/azure/frontdoor/standard-premium/how-to-configure-https-custom-domain) and [TLS encryption with Azure Front Door](/azure/frontdoor/end-to-end-tls).
43
43
44
-
- Always test failover procedures in non-production environments first.
44
+
- Always test failover procedures ahead of time in non-production environments first.
45
45
46
-
-**Traffic Manager doesn't support CNAME flattening at the DNS zone apex (root domain):** If you require Traffic Manager at the apex, you must use DNS providers that support alias records or similar mechanisms.
46
+
-**Traffic Manager doesn't support CNAME flattening at the DNS zone apex (root domain):** If you require Traffic Manager at the apex, you must use DNS providers that support alias records or similar mechanisms.[Azure DNS](/azure/dns/dns-alias) is one such DNS provider.
47
47
48
-
- Use short DNS TTLs (300 - 600 seconds) and monitor DNS TTL propagation times with your user base before setting aggressive TTLs.
48
+
- Use short DNS TTLs (300 - 600 seconds) and monitor DNS TTL propagation times.
49
49
50
-
-**Security:** Lock down Application Gateway with NSGs/ACLs (allow required platform ranges and inbound application ports) and keep origins secured for all ingress paths. For more information, see [Configure network security groups for your Application Gateway](/azure/application-gateway/configuration-infrastructure#network-security-groups).
50
+
- **Security:** Lock down Application Gateway with network security groups (NSGs)/ACLs (allow required platform ranges and inbound application ports) and keep origins secured for all ingress paths. For more information, see [Configure network security groups for your Application Gateway](/azure/application-gateway/configuration-infrastructure#network-security-groups). While Application Gateway WAF mitigates HTTP/L7 attacks, NSGs provide packet filtering only and don't protect against volumetric or protocol level (L3/L4) DDoS attacks. All Azure public endpoints benefit from baseline, always on Azure platform DDoS protection, which is designed to protect the Azure infrastructure but doesn't include workload specific tuning, telemetry, cost protection, or availability guarantees. For production and mission critical workloads, consider Azure DDoS Network Protection to protect Application Gateway public IPs. For more information, see [Azure DDoS Protection pricing](https://azure.microsoft.com/pricing/details/ddos-protection/#:~:text=When%20Azure%20Application%20Gateway%20with%20WAF%20is%20deployed%20in%20a%20protected%20virtual%20network%2C%20there%20are%20no%20additional%20charges%20for%20WAF%20-%20you%20pay%20for%20the%20Application%20Gateway%20at%20the%20lower%20non-WAF%20rate) for more details.
51
51
52
52
- Document WAF rule differences between Front Door and failover solutions.
53
53
54
-
-**Origin security consideration:**For production environments, consider using `X-Azure-FDID` header validation and IP address filtering for enhanced origin security. For more information, see [Secure traffic to Azure Front Door origins](/azure/frontdoor/origin-security?tabs=app-service-functions&pivots=front-door-standard-premium#public-ip-address-based-origins). **Private Link is not recommended for these HA architectures** because alternative CDNs can't access origins protected by Front Door Private Link, and Application Gateway requires additional virtual network/Private Endpoint configuration to access private origins, and can't use Front Door's native Private Link integration.
54
+
-**Origin security consideration:** Private Link is not recommended for these HA architectures because alternate CDN platforms can't access origins protected by Azure Front Door's Private Link integration. Additionally, Application Gateway requires extra virtual network and Private Endpoint configuration to reach private origins and can't leverage Front Door's native Private Link capabilities. For production environments utilizing Azure Front Door alongside other CDN providers, consider using alternative, CDN‑agnostic origin‑security controls such as token‑based origin authentication (HMAC or signed URLs), mutual TLS (mTLS), custom origin headers, and IP address filtering to enforce origin trust when Private Link or `X‑Azure‑FDID` validation can't be used.
55
55
56
56
-**Edit the sample commands listed in this guide so that they are tailored to your environment for automation and runbooks.**
57
57
58
58
- Establish clear runbooks and test failover and failback procedures.
59
59
60
60
- Configure comprehensive monitoring and alerting for all endpoints.
61
61
62
-
-Plan for gradual traffic shifting during failover to validate functionality.
62
+
-Validate functionality during failover to alternate ingress solutions.
63
63
64
64
- Test certificate renewal processes across all platforms.
> - This guide uses Azure CLI sample commands executed from within PowerShell.
70
-
> - Before proceeding, review the [Global routing redundancy for mission-critical web applications](/azure/architecture/guide/networking/global-web-applications/overview?tabs=cli).
68
+
- This guide uses Azure CLI sample commands executed from within PowerShell.
69
+
70
+
- Before proceeding, review the [Global routing redundancy for mission-critical web applications](/azure/architecture/guide/networking/global-web-applications/overview).
71
71
72
72
## Scenario 1: Traffic Manager failover: Front Door to Application Gateway WAF
73
73
@@ -77,14 +77,14 @@ This DNS-based load balancing solution uses multiple Azure Traffic Manager profi
77
77
78
78
**Traffic flow (Normal operation):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve routing) → Front Door (Priority 1) → Origin Servers.
79
79
80
-
**Traffic flow (Front Door failure):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve @copilotrouting) → Secondary Traffic Manager (Priority mode) → Application Gateway(s) → Origin Servers.
80
+
**Traffic flow (Front Door failure):** User → DNS Query → Primary Traffic Manager (Weighted / Always serve routing) → Secondary Traffic Manager (Priority mode) → Application Gateway(s) → Origin Servers.
81
81
82
82
### Pre-deployment: Front Door vs Application Gateway
83
83
84
84
It's important to understand the feature differences between Front Door and Application Gateway WAF in case you're utilizing any features Application Gateway WAF doesn't offer. The following two tables provide an overview.
85
85
86
86
> [!IMPORTANT]
87
-
> This solution assumes you are currently using Azure Front Door to serve traffic across multiple regions or globally. In this design, the steps below introduce a **secondary Azure Traffic Manager configured with Performance routing between the primary Traffic Manager and regional Application Gateway instances**. This approach is necessary because Azure Front Door is a global Layer‑7 service, so the secondary Traffic Manager effectively replaces Front Door's global latency‑based routing by acting as the global load‑balancing layer. As a result, **Traffic Manager preserves latency‑optimized user routing for a geographically distributed audience**. Given this architectural shift, **you must evaluate global traffic patterns and deploy Application Gateway instances in regions that have meaningful user volume to ensure optimal performance and resilience**.
87
+
> This solution assumes you're currently using Azure Front Door to serve traffic across multiple regions or globally. In this design, the steps below introduce a **secondary Azure Traffic Manager configured with Performance routing between the primary Traffic Manager and regional Application Gateway instances**. This approach is necessary because Azure Front Door is a global Layer‑7 service, so the secondary Traffic Manager effectively replaces Front Door's global latency‑based routing by acting as the global load‑balancing layer. As a result, **Traffic Manager preserves latency‑optimized user routing for a geographically distributed audience**. Given this architectural shift, **you must evaluate global traffic patterns and deploy Application Gateway instances in regions that have meaningful user volume to ensure optimal performance and resilience**.
88
88
89
89
#### Features differences
90
90
@@ -136,48 +136,40 @@ It's important to understand the feature differences between Front Door and Appl
136
136
137
137
### Recommendations
138
138
139
-
-Maintain separate custom rule sets. Use Front Door rules as baseline.
139
+
-Because you must maintain distinct rule sets for each WAF, use the Front Door rule set as your baseline. Create an Application Gateway rule set that matches the Front Door rule set as closely as possible.
140
140
- Test Application Gateway WAF separately and independently.
141
141
- Document all custom exclusions for both platforms.
142
142
- Regularly audit rule sets for consistency.
143
+
- Adhere to the network guidance within [Azure Application Gateway infrastructure configuration](/azure/application-gateway/configuration-infrastructure) specially. Ensure to exercise the following:
143
144
144
-
### Network planning
145
-
146
-
The following are virtual network and subnet requirements:
147
-
148
-
#### Subnet sizing (per region)
149
-
150
-
- Minimum: /27 (32 addresses)
151
-
152
-
- Recommended: /24 (256 addresses) for autoscaling and hitless maintenance
- Example: 20 max instances → (20 \* 10) + 5 = 205 IPs → use /24
167
156
168
-
- Dedicated subnet for Application Gateway (no other resources)
169
157
170
-
-**Inbound allows:**
158
+
- **Securing Application Gateway:**
171
159
172
-
- 443/80 from Internet (or specific source ranges)
160
+
- Dedicated subnet for Application Gateway (no other resources)
173
161
174
-
- 65200-5535 from GatewayManager (Application Gateway v2)
162
+
- **Inbound allows:**
175
163
176
-
- AzureLoadBalancer
164
+
- 443/80 from Internet (or specific source ranges)
165
+
166
+
- 65200-5535 from GatewayManager (Application Gateway v2)
167
+
168
+
- AzureLoadBalancer
177
169
178
-
- Block other inbound. Don't block required outbound internet
170
+
- Block other inbound. Don't block required outbound internet
179
171
180
-
- Use ASGs for backend segmentation and least-privilege rules
172
+
- Use ASGs for backend segmentation and least-privilege rules
181
173
182
174
> [!NOTE]
183
175
> For capacity planning and autoscaling strategy, see [Architecture best practices for Azure Application Gateway v2](/azure/well-architected/service-guides/azure-application-gateway).
@@ -206,7 +198,7 @@ The following are virtual network and subnet requirements:
206
198
1. Create managed identity and grant Key Vault access. For more information, see [TLS termination with Key Vault certificates](/azure/application-gateway/key-vault-certs).
207
199
208
200
> [!NOTE]
209
-
> Application Gateway requires the SSL/TLS certificate in PFX format with private key. The certificate must be accessible from Azure Key Vault or uploaded directly. Use the same Front Door certificate to ensure consistent TLS behavior.
201
+
> Application Gateway requires the SSL/TLS certificate in PFX format with private key. The certificate must be accessible from Azure Key Vault or uploaded directly. Use the same certificate that Front Door uses to ensure consistent TLS behavior.
210
202
211
203
1. Create WAF policy. For more information, see [Create Web Application Firewall policies for Application Gateway](/azure/web-application-firewall/ag/create-waf-policy-ag)
212
204
@@ -325,7 +317,7 @@ The following are virtual network and subnet requirements:
325
317
326
318
> [!WARNING]
327
319
> **Potential service impact:** The following steps will redirect your production traffic from Front Door directly to Traffic Manager. Before proceeding:
328
-
> - **Test these steps in a non-production environment first**.
320
+
> - **Test these steps in a non-production environment first** (for example, by temporarily modifying the local `hosts` file on a non‑production workstation to resolve the custom domain to the Traffic Manager endpoint, allowing validation without affecting live traffic).
329
321
> - **Reduce your DNS CNAME TTL to the lowest value possible** (for example, 60-300 seconds) at least 24-48 hours before making changes.
330
322
> - **Plan for a maintenance window** during low-traffic periods if possible.
331
323
> - **Have rollback procedures ready** in case issues arise.
@@ -459,7 +451,7 @@ The following are virtual network and subnet requirements:
459
451
> [!NOTE]
460
452
> The response headers can help identify the serving endpoint:
461
453
> - Front Door includes `x-azure-ref` header.
462
-
> - Application Gateway includes `Server: Microsoft-IIS` or similar.
454
+
> - Traffic that passes through Application Gateway might include `Server: Microsoft-IIS` or similar.
463
455
464
456
## Scenario 2: Traffic Manager failover: Front Door to alternative CDN
0 commit comments