Azure Container Apps is a fully managed environment that enables you to run microservices and containerized applications on a serverless platform. When you host your apps or microservices in Azure Container Apps, you may not always want to publish them directly to the internet. Instead, you may want to expose them through a reverse proxy, a content delivery network (CDN) or any other similar device.
Azure Front Door is Microsoft’s modern cloud Content Delivery Network (CDN) that can help you deliver higher availability, lower latency, greater scale, and more secure experiences to your users accessing your container apps.
In this article, you learn to configure a Container App with Front Door. (For configuring with Custom Domain, see Configure Container App behind Front Door with Custom Domain - Microsoft Community Hub)
PREREQUISITES
Note: This article uses Front Door Standard/Premium.
This configuration involves the Front Door accessing the Container App using its default domain, suffixed as ".azurecontainerapps.io".
When Container App doesn't have a custom domain associated with it, the host header on the incoming request on the application will need to be set to the default domain, suffixed with ".azurecontainerapps.io" or else the platform won't be able to properly route the request.
SCENARIO | TYPE | IS SUPPORTED? | STEPS |
Consumption-only environment | Internal | Yes | Proceed as discussed below. |
External | Yes | Proceed as discussed below. | |
Consumption + Dedicated environment | Internal | No | Private Link Service does not support a load balancer that has IP based backend pool, which is used in Consumption + Dedicated environments. |
External | Yes (but cannot be locked down) | When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the managed resource group rather than through subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. Proceed as discussed below. |
To configure Front Door with Container App hosted in Internal Environment This will create a Private Link to the internal load balancer in the environment MC_ resource group. |
I. CREATE A NEW AZURE FRONT DOOR ENDPOINT
The Front Door profile must have at least one or more endpoints.
II. ADD A ROUTE
Setting | Description |
Name | Enter a name to identify the mapping between domains and origin group. |
Domains | A domain name has been auto-generated for you to use. |
Patterns to match | Set all the URLs this route will accept. |
Accepted protocols | Select the protocol the route will accept. (NOTE: If you choose HTTP as an accepted protocol, ensure that you allow insecure connections on your Container Apps Ingress configuration) |
Redirect | Enable this setting to redirect all HTTP traffic to the HTTPS endpoint. |
Origin group | Select Add a new origin group. Then select + Add an origin. Enter <originname> for the Name and then for the Origin Type select Custom. In the Host name, type the Container Apps URL. Select Add to add the origin to the origin group. Once the origin has been added, select Add to save the origin group configuration. |
Origin path | Leave blank. |
Forwarding protocol | Select the protocol that will be forwarded to the origin group. |
Lastly, validate that your application content is getting served using a browser.
CONSIDERATIONS
REFERENCES
Configure an endpoint with Front Door manager - Azure Front Door | Microsoft Learn
How to configure origins - Azure Front Door | Microsoft Learn
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.