🔏
Azure Serverless Quickstart
  • Introduction
  • Initial Setup
    • Workstation Installs
    • Codebase
      • Directory Structure
      • User Interface Project
        • Configuring StoryBook
        • Configure Tailwind
        • Configure Craco
        • -Architectural Decision Log
      • Data Access Project
        • DDD
      • Untitled
      • Full Stack Debugging
      • Creating GitHub Project
    • Infrastructure
      • Configure Session Behavior
      • Create AAD Tenant
      • Resource Group
      • Create AAD B2C Instance
        • Identity Experience Framework
        • Configure Session Behavior
      • Storage Account & CDN
        • CDN Rules
        • Configure Azure BLOB Storage
      • App Insights
        • Create AppInsight Account
        • Apollo GraphQL App Insights Configuration
      • CosmosDB
      • Twilio SendGrid
      • KeyVault
      • Function
      • Function App Settings
      • Front Door
      • DevOps
      • Optional Items
        • Azure Data Factory
      • Azure Event Hub
    • CICD and Source Control
      • Azure DevOps
      • SonarCloud
        • Incorporate into Yaml
      • Chromatic
      • User Interface YAML
      • CICD for Data Access
        • Create Pipeline
        • Data Access YAML
  • Application Structure
    • Connect Apollo
      • Apollo Overview
      • Create Apollo Component
    • MongoDB Integration
      • Mappings
      • Directory Structure
      • Apollo Connection
      • Models
      • Queries Mutations and Subscriptions
      • Caching Reponses
    • Integrating GraphQL Tools
      • GraphQL Code Generator
    • Feature Flags
      • Flag Structure & Storage
      • Website Integration
      • Apollo Integration
      • Tips and Techniques
      • Alternative Approaches
    • React Router
    • Adding Authentication
      • Create AAD Applications
      • Configure AAD For External Identities
      • Adding MSAL And React
      • Add MSAL to the build
      • Add MSAL to ApolloClient
      • Add MSAL to ApolloServer
    • Ant Design
    • Jest Tests
  • Azure Active Directory Business-to-Consumer (AD B2C)
    • Introduction
    • How to navigate through AD B2C documentation
    • Localization
    • Abbreviations
    • Azure AD B2C Extension
  • Cognitive Search
  • Cost Analysis
  • Technical Architecture
    • Identity and Access Control
  • Adding Functionality
    • Google Analytics
      • Create Analytics
    • DAPR
      • DAPR setup
      • DAPR Services (ignore for now)
        • Identity
  • Patterns and Practices
    • Idempotent Messages
    • Pathways
    • DDD
      • Initial Setup
        • Aggregate Root
        • Entity
        • Value Object
      • Field Types
        • Primitive Types
        • Non-Primitive Types
          • Types.DocumentArray
          • PopulatedDoc
          • Custom Types
      • Example Walkthrough
  • Open Items
    • Issue Tracking
  • Helpful Resources
  • DDD
    • Page 1
  • Experimental
    • StaticWebApp
    • Azure Maps
Powered by GitBook
On this page

Was this helpful?

  1. Initial Setup
  2. Infrastructure

Front Door

(~10 minutes)

PreviousFunction App SettingsNextDevOps

Last updated 4 years ago

Was this helpful?

Azure Front Door provides SSL Termination / Traffic Routing / Web Application firewall and many other features.

Create a Web Application Firewall (WAF) Policy

  • In the Azure portal select

  • Policy For : Global WAF (Front Door)

  • Choose the appropriate subscription and the rg-sharethrift resource group (the resource group location will be prefilled in)

  • Instance details

  • Policy Name: sharethrift

  • Policy State: enabled

  • Choose Next : Policy Settings >

  • Mode : Prevention

  • Choose Next: Managed Rules >

  • Ensure DefaultRuleset is checked.

  • Click Review + Create

  • Click Create

Create the Front Door

  • Choose the appropriate subscription and the rg-sharethrift resource group (the resource group location will be prefilled in)

  • Choose Next : Configuration >

  • In the configuration screen in Frontends/domains, click +

    • Add a frontend host will be displayed

    • Enter Host Name: sharethrift<<ranndom number>>

    • Leave Session Affinity as Disabled

    • Set Web Application Firewall to Enabled

    • Policy: select sharethrift

    • Click Add

  • In the configuration screen in Backend Pools, click +

    • For name: set to sharethrift-data-access

    • In Backends, click + add a backend

      • Add the data-access in East US 2

        • Host type : App Service

        • Subscription : <<make the appropriate choice>>

        • Backend Host Name: data-access-<<random number>>.azurewebsites.net

        • (leave the rest of the options the way they are)

        • Click Add

      • Add the data-access in West US 2

        • Host type : App Service

        • Subscription : <<make the appropriate choice>>

        • Backend Host Name: data-access-west<<random number>>.azurewebsites.net

        • (leave the rest of the options the way they are)

        • Click Add

    • in Health Probes specify

      • Path: /api/graphql/.well-known/apollo/server-health

      • Probe Method: GET

    • (leave the rest of the options the way they are)

    • Click Add

  • In the configuration screen in Routing Rules, click +

    • Name: sharethrift-data-access

    • Accepted Protocol: HTTPS only

    • Patterns to match : (leave as is)

    • Route Type: Forward

    • Backend Pool: sharethrift-data-access

    • Forwarding Protocol: Https Only

    • URL Rewrite: Disabled

    • Caching: Enabled

    • Query String Caching Behavior: Cache Every Unique URL

    • Dynamic Compression: Enabled

    • Use default cache duration: Yes

    • Click: Add

  • Click Review+Create

  • Click Create (wait for completion)

Resources

  • Microsoft

In the Azure portal select

Create a WAF Policy
Create a Front Door
Create a FrontDoor - Portal
Apollo GraphQL Healthcheck