Azure Front Door Resiliency Deep Dive and Architecting for Mission Critical

By John Savill's Technical Training

Share:

Key Concepts

  • Azure Front Door (AFD): A global Layer 7 load balancing and content delivery network (CDN) service that provides a single point of entry for applications.
  • Points of Presence (PoPs): Globally distributed data centers where AFD services its capabilities.
  • Anycast IP Addressing: A networking technique where a single IP address can be served by multiple PoPs, and clients connect to the closest one.
  • Split TCP: A method used by AFD to terminate TCP and TLS sessions at the PoP, improving performance.
  • Web Application Firewall (WAF): A security feature of AFD that protects against common web attacks.
  • Origins: The backend services or servers that host application content.
  • Azure App Gateway: A regional Layer 7 load balancer.
  • Azure Traffic Manager: A DNS-based traffic load balancer.
  • Resiliency Layers (AFD):
    • Front-end Layer: Composed of over 210 highly resilient PoPs.
    • Fallback Layer: A secondary set of infrastructure used to shed traffic from the front-end layer.
    • Traffic Shield: An overwatch system that monitors the front-end and fallback layers and can adjust IP routing.
  • Safe Deployment Practices: Methodologies used by Azure Front Door to roll out configuration changes gradually and safely.
  • Config Shield: A gate within the safe deployment process that monitors for crashes and reverts to a last known good configuration if issues arise.
  • Mission Critical Services: Services that require extremely high availability and cannot tolerate any downtime.
  • Microcell Segmentation: A new feature in AFD aimed at reducing cross-tenant impact.

Azure Front Door Native Resiliency Capabilities

Azure Front Door is a global Layer 7 load balancing and content delivery network (CDN) service. It acts as the initial front-end for applications, understanding HTTP, HTTPS, and TLS.

Global Distribution and Connectivity

  • Points of Presence (PoPs): AFD utilizes over 210 PoPs distributed across more than 130 metro locations worldwide.
  • Anycast IP Addressing: Clients connect to a single global anycast IP address, which is served by the closest available PoP. This ensures low latency and high availability.
  • Split TCP: Upon connecting to a PoP, the TCP and TLS sessions are terminated at that PoP, further reducing latency and improving performance.

Core Functionalities

  • Content Delivery Network (CDN): AFD can optionally cache content at its PoPs, serving it locally to users and reducing the load on origins.
  • Web Application Firewall (WAF): An optional WAF provides protection against common attacks and bots, supporting HTTP, HTTPS, and HTTP2 traffic while rejecting others. It also includes DoS protection and rich policy rules for traffic routing.
  • Origin Connectivity: AFD can connect to various origins, including Azure services, services exposed via private endpoints (with AFD Premium), public IP addresses, and other hosts.
  • Load Balancing Algorithms: Supports algorithms like round robin, weighted, priority, and latency-based routing.
  • Health Checks: Continuously monitors the health of origins.
  • Integration with Regional Load Balancers: Often used in conjunction with regional Layer 7 load balancers like Azure App Gateway (including App Gateway for containers) to manage traffic at a regional level before it reaches individual pods.

Azure Front Door Resiliency Architecture

Azure Front Door's resiliency is built on a multi-layered approach:

1. Front-end Layer

  • This layer consists of the 210+ PoPs, each designed for high resiliency.
  • PoP Structure: Each PoP is composed of multiple racks with numerous servers running the AFD software.
  • Edge Controllers: A Layer 4 load balancing solution within each PoP that directs traffic to healthy servers and handles DoS capabilities. These are built for purpose and are not standard Azure Load Balancers.
  • Distribution: PoPs are distributed across Microsoft and colocation partner data centers that meet Microsoft's regulatory and compliance requirements.
  • Native Failover: If any single PoP fails, the anycast IP addressing ensures that clients automatically connect to the next closest available PoP.

2. Fallback Layer

  • This layer uses the same software and architecture as the front-end layer but is only activated when the front-end layer needs to shed traffic.
  • Purpose: Used when PoPs are overwhelmed or unavailable, preventing performance degradation for clients.
  • Scale: Consists of tens of instances, primarily located within Microsoft data centers (Azure regions).
  • Capabilities: Offers caching, routing to origins, and other functionalities identical to the front-end layer.

3. Traffic Shield

  • This layer acts as an "overwatch" for the front-end and fallback layers.
  • Functionality: Monitors the load on these layers. If they become overwhelmed, Traffic Shield can update how Azure Traffic Manager serves IP addresses.
  • Traffic Shifting: It can shift traffic away from overwhelmed PoPs by returning regional anycast IPs instead of global ones, or by re-routing traffic between different sets of PoPs (typically within continents).

DNS Resolution and Azure Traffic Manager

  • When using Azure Front Door, clients resolve a DNS name (e.g., azurefd.net).
  • This DNS resolution is served by Azure Traffic Manager, which returns the appropriate anycast IP address.
  • Azure Traffic Manager itself has a 100% SLA, providing a financial-backed guarantee of service.
  • AFD can return global or regional anycast IPs, offering flexibility in traffic routing.

Safe Deployment and Configuration Resilience

Azure Front Door employs robust safe deployment practices to minimize the risk of configuration-related outages.

Configuration Types and Rollout Cadence

  1. System Config: Refers to AFD's internal data plane and control plane configurations.
    • Rollout: Uses a very slow rollout across all PoPs over a two-week period to ensure stability.
  2. Data Config: Includes data like geo-location information, IP reputation feeds for bot detection, and WAF signatures.
    • Rollout: Follows a daily cadence, rolling out updates to all PoPs within a 24-hour period.
  3. Customer Config: Changes made by customers to origins, routing rules, etc.
    • Rollout: Follows a rapid, three-ring deployment model over a 10-minute window (currently 45 minutes due to recent events, reverting to 10 minutes in January 2026).
      • Pre-prod: A small set of 4-5 PoPs not actively handling traffic.
      • Staging: A larger set of approximately 15 PoPs.
      • Production: The remaining PoPs.

Config Shield and Recent Outage Mitigation

  • Config Shield: Acts as a gate between deployment rings. It monitors for crashes during the rollout. If crashes occur, it stops the deployment and reverts to the last known good configuration.
  • October 2025 Outage Cause: The outage was caused by a combination of configuration metadata that, when processed by an asynchronous optimization process, led to crashes. The safe deployment practices and Config Shield were bypassed because the asynchronous process was not running at the time the problematic metadata was deployed.
  • Mitigation and Fixes:
    • Removal of Async Processing: All asynchronous processes have been removed. All code paths are now synchronous and tested as they move through deployment rings. This ensures Config Shield will detect issues.
    • Faster Rollback: The time to roll back to a last known good configuration has been significantly reduced. It was 4 hours, reduced to 1 hour (as of November 2025), and is targeted to be 10 minutes by March 2026.
    • Microcell Segmentation: A new feature to reduce cross-tenant impact. If an issue occurs, it should only affect less than 1% of the AFD population. This is targeted for June 2026.

Strategies for Mission-Critical Services

For services that are truly mission-critical and cannot tolerate any downtime, additional architectural considerations beyond AFD's native resiliency are necessary.

Scenario 1: No CDN Functionality Required

  • Architecture:
    1. Azure Traffic Manager (Primary): Placed in front of Azure Front Door.
      • Configuration: "Always Serve" mode (no health probes), weighted traffic (100% to AFD normally), TTL of 300 seconds (5 minutes).
    2. Azure Front Door: The primary entry point.
    3. Azure App Gateway (DR Path): Deployed in front of origins.
      • Functionality Replication: App Gateway replicates AFD's Layer 7 capabilities, including TLS termination and WAF.
      • Public Exposure: Origins and App Gateways must be publicly accessible for this DR path.
    4. Azure Traffic Manager (DR Path): A second instance in "Performance" mode, targeting the App Gateways.
      • Manual Failover: This is a "manual break glass" scenario. A script would reconfigure the primary Traffic Manager to shift traffic (e.g., 0% to AFD, 100% to the DR Traffic Manager).
      • Probes: Health probes are used for the DR path to monitor application health.

Scenario 2: CDN Functionality Required

  • Architecture:
    1. Azure Traffic Manager (Primary): Placed in front of Azure Front Door.
      • Configuration: "Always Serve" mode, weighted traffic (90% to AFD, 10% to alternate CDN), TTL of 300 seconds.
    2. Azure Front Door: Primary entry point with caching enabled.
    3. Alternate CDN: A second CDN solution from a different provider.
      • Purpose: To provide a fallback for caching capabilities.
      • Cache Population: The 10% traffic to the alternate CDN helps pre-populate its cache, preventing a "rush" on origins during a failover.
    4. Manual Failover: Similar to Scenario 1, a script would reconfigure the primary Traffic Manager to shift 100% of traffic to the alternate CDN.

Addressing Azure Traffic Manager as a Potential Single Point of Failure

While Azure Traffic Manager has a 100% SLA, for extreme mission-critical scenarios, further redundancy can be implemented:

  • DNS Caching: Clients already using a DNS record can continue to use it for its TTL duration (e.g., 5 minutes) even if the DNS service experiences a blip.
  • Client-Side Caching: Application logic can cache resolved IP addresses and fall back to the cached value if DNS resolution fails.
  • Secondary DNS Provider: Using a second DNS provider in an active-active configuration provides an alternative for DNS resolution if Azure Traffic Manager is unavailable.

Conclusion and Key Takeaways

Azure Front Door offers robust native resiliency through its distributed PoP architecture, fallback layers, and traffic management capabilities. Recent improvements, including the removal of asynchronous processing and faster rollback times, have significantly enhanced its resilience against configuration-related issues.

For mission-critical services that demand absolute availability, architects can implement additional layers of redundancy by:

  • Using Azure Traffic Manager as a primary global load balancer with AFD as the preferred path.
  • Establishing a disaster recovery path, which may involve Azure App Gateway to replicate AFD's Layer 7 functionality (if CDN is not required) or a secondary CDN provider (if caching is required).
  • Implementing manual failover mechanisms and considering advanced DNS resiliency strategies.

The core principle for mission-critical design is to assume any component can fail and build in alternative paths and redundancy accordingly.

Chat with this Video

AI-Powered

Hi! I can answer questions about this video "Azure Front Door Resiliency Deep Dive and Architecting for Mission Critical". What would you like to know?

Chat is based on the transcript of this video and may not be 100% accurate.

Related Videos

Ready to summarize another video?

Summarize YouTube Video