MS Docs

Networking Guidelines

Welcome to the networking guidelines section for our platform. This document outlines best practices, recommendations, and requirements for developing and deploying networked applications and services.

Important: Always refer to the latest version of these guidelines. Changes may be introduced to reflect evolving security landscapes and platform updates.

General Principles

Our networking strategy is built on the following core principles:

Protocol Recommendations

We recommend the following protocols for various use cases:

Security Considerations

Security is non-negotiable. Pay close attention to the following:

Performance Optimization

To ensure a smooth user experience and efficient resource utilization:

Error Handling and Resilience

Network failures are inevitable. Build systems that can withstand them:

Observability and Monitoring

Understanding your network traffic is crucial for troubleshooting and performance tuning:

Area Key Metrics Tools/Practices
Traffic Volume Requests per second, Bytes in/out Network monitoring tools, Prometheus, Grafana
Latency Request duration, Round-trip time (RTT) Application Performance Monitoring (APM), Tracing (OpenTelemetry)
Error Rates HTTP status codes (4xx, 5xx), Connection errors Logging, Alerting systems
Security Events Failed authentication, Suspicious traffic patterns Firewall logs, Intrusion Detection Systems (IDS)
Best Practice: Integrate comprehensive logging for all network requests, including source IP, destination, timestamp, request method, URL, status code, and response size.

Further Reading