This solved my problem with HTTPS at the origin side. Thank you!
@Marcelk862 жыл бұрын
Adam, you are excellent in explaining in a structured way! Looking forward for more content!
@jinbaoxin2 жыл бұрын
Fantastic contents, I like your methodological way of explaining things, keep it up, cannot wait for you next video.
@asadmahmand10916 ай бұрын
Fantastic video, very nicely explaind.
@amglover4361 Жыл бұрын
Thank you for explaining that so clearly
@paddee2k10 ай бұрын
Excellent content! Thank you Adam!
@rsutube-dec3 ай бұрын
Thanks for the video. I have a question if you can please help me in my situation where I have an IIS hosting multiple sites with bindings. How do I set up my front door and its origin etc.? And site names are similar with app name and then environment name and they all resolve to the pip of the VM.
@pdaniaful5 ай бұрын
Just investigating this option for an Azure app service backend app but it looks like I need to upgrade from Afd standard to premium to take advantage of the private link option. Will Azure Front door make use of an existing private endpoint that is has already been setup or does it have to create the managed vnet and pls?
@rsutube-dec3 ай бұрын
I have posted my question twice but I do not see it after refresh? Is something wrong?
@liamobrien15062 жыл бұрын
Great video and content. I have a question, do you see a way of inserting an NVA (Palo Alto) somewhere in the path, perhaps using something like azure gaeway load balancer? I am currently working on designing inbound traffic patterns for a variety of services on our Azure edge, both WAF and a NVA are requirements in that path.
@AdamStuart12 жыл бұрын
Hi Liam. If you mean AFD > NVA > Backend. Then yes, you could do that either with or without Private Link. Without Private Link you would define the Origin as the Palo Alto PiP, probably attached to an external LB. With Private Link, you would map a PLS to a SLB in front of the NVA. Hope this helps. (Normally in this scenario Palo/NVA is performing the function of a reverse proxy also, as the regional ADC).
@spop1974 Жыл бұрын
Perfect!
@timeverts Жыл бұрын
Great video. I have a question though. If using Front Door's private link (Microsoft Managed VNET) to protect an App Service and deploying changes to that App Service using an Azure Devops Pipeline, how do I give permission to the Microsoft Hosted Agents to deploy code to the app service? With the private link in place there is no permission to deploy to the app service, as it is not publicly accessible.
@AdamStuart1 Жыл бұрын
Not something I've looked in to, this thread looks similar to your question - stackoverflow.com/questions/64845673/deploy-app-service-with-private-endpoint-via-azure-devops
@kevinyang41412 ай бұрын
Is there a need for private DNS zone?
@windyearle Жыл бұрын
But we can't use this if our origins are in an unsupported region, like West US ?
@carloseduardorodriguesdeal7162 жыл бұрын
How could i use AFD Premium with my AKS Cluster?
@wenshuohan83702 жыл бұрын
I am trying afdx -> pl - > app service -> regional vnet integration -> pl - > azure sql. Is it possible?
@AdamStuart12 жыл бұрын
Yes should work
@rsutube-dec3 ай бұрын
Thanks for the video. I have a question if you can please help me in my situation where I have an IIS hosting multiple sites with bindings. How do I set up my front door and its origin etc.? And site names are similar with app name and then environment name and they all resolve to the Private IP of the VM.