An Azure service that provides a cloud content delivery network with threat protection.
Hi @ devwa,
Welcome to Microsoft Q&A Platform.
Sorry you’ve been hitting that “FDN degraded” alert for days
Please verify the below steps from your end.
- Verify your health-probe configuration • In your Front Door (Standard/Premium) resource, under Backend Pools → Origin Groups → Health Probes, confirm: – Protocol (HTTP vs. HTTPS) and port match your origin’s listening endpoint – Probe path returns a simple 200 OK (no auth redirects or 404s) – Probe method (GET vs. HEAD)—HEAD is preferred to reduce load – Interval, timeout, SampleSize, and SuccessfulSamplesRequired settings aren’t too aggressive • If you only have one origin, you can consider disabling health probes to avoid false failures.
- Check health probe logs & backend health • Enable diagnostic logs for Front Door and filter on HealthProbeLog. Look at: – Result (timeout, DNS error, HTTP status code) – POP (which edge location is failing) – TotalLatency and ConnectionLatency (to catch network/DNS issues) • In the portal’s Backend health blade, see which origins or regions are marked unhealthy and note the timestamps.
- Validate origin reachability • From a public internet client or VM, curl the probe endpoint exactly (same host header, path, port) to ensure it’s reachable and returns 200. • Review your app logs or monitoring for any errors at the time of probes. • Confirm any firewall, NSG or WAF rules allow traffic from Azure Front Door IP ranges.
- Use built-in diagnostics & metrics • Capture a RefString (X-Azure-Ref header) from a failed request and run the built-in RefString diagnostic in Front Door diagnostics. • Check Azure Status and Service Health for any ongoing Front Door incidents. • Review load-balancing settings—if SampleSize is high but your origin is slow to boot or respond, you can reduce it.
Please
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.