You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/availability-overview.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ There are four types of availability tests:
23
23
*[Standard test](availability-standard-tests.md): This single request test is similar to the URL ping test. It includes TLS/SSL certificate validity, proactive lifetime check, HTTP request verb (for example, `GET`, `HEAD`, or `POST`), custom headers, and custom data associated with your HTTP request.
24
24
*[Custom TrackAvailability test](availability-azure-functions.md): If you decide to create a custom application to run availability tests, you can use the [TrackAvailability()](/dotnet/api/microsoft.applicationinsights.telemetryclient.trackavailability) method to send the results to Application Insights.
25
25
* Classic tests (**older versions of availability tests**)
26
-
*[URL ping test](monitor-web-app-availability.md): You can create this test through the Azure portal to validate whether an endpoint is responding and measure performance associated with that response. You can also set custom success criteria coupled with more advanced features, like parsing dependent requests and allowing for retries.
26
+
*[URL ping test (deprecated)](monitor-web-app-availability.md): You can create this test through the Azure portal to validate whether an endpoint is responding and measure performance associated with that response. You can also set custom success criteria coupled with more advanced features, like parsing dependent requests and allowing for retries.
27
27
*[Multi-step web test (deprecated)](availability-multistep.md): You can play back this recording of a sequence of web requests to test more complex scenarios. Multi-step web tests are created in Visual Studio Enterprise and uploaded to the portal, where you can run them.
28
28
29
29
> [!IMPORTANT]
@@ -34,19 +34,19 @@ You can create up to 100 availability tests per Application Insights resource.
34
34
> [!NOTE]
35
35
> Availability tests are stored encrypted, according to [Azure data encryption at rest](../../security/fundamentals/encryption-atrest.md#encryption-at-rest-in-microsoft-cloud-services) policies.
36
36
37
-
## Availability Test TLS Support
37
+
## Availability test TLS support
38
38
To provide best-in-class encryption, Availability Tests uses Transport Layer Security (TLS) 1.2 or higher as the encryption mechanism of choice.
39
39
40
40
> [!WARNING]
41
-
> On 31 October 2024, in alignment with the [Azure wide legacy TLS deprecation](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/) TLS 1.0/1.1 protocol versions and TLS 1.2/1.3 legacy Cipher Suites and Elliptical Curves will be retired for Application Insights Availability Tests.
41
+
> On 31 October 2024, in alignment with the [Azure wide legacy TLS deprecation](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/) TLS 1.0/1.1 protocol versions and TLS 1.2/1.3 legacy Cipher suites and Elliptical curves will be retired for Application Insights Availability Tests.
42
42
43
-
### Supported TLS Configurations
44
-
TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availability Tests. In addition, the following Cipher Suites and Elliptical Curves are also supported within each version.
43
+
### Supported TLS configurations
44
+
TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availability Tests. In addition, the following Cipher suites and Elliptical curves are also supported within each version.
45
45
> [!NOTE]
46
46
> TLS 1.3 is currently only available in these Availability Test regions: NorthCentralUS, CentralUS, EastUS, SouthCentralUS, WestUS
47
47
48
48
#### TLS 1.2
49
-
**Cipher Suites**
49
+
**Cipher suites**
50
50
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
51
51
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
52
52
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
@@ -56,52 +56,52 @@ TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availa
56
56
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
57
57
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
58
58
59
-
**Elliptical Curves**
59
+
**Elliptical curves**
60
60
- NistP384
61
61
- NistP256
62
62
63
63
#### TLS 1.3
64
-
**Cipher Suites**
64
+
**Cipher suites**
65
65
- TLS_AES_256_GCM_SHA384
66
66
- TLS_AES_128_GCM_SHA256
67
67
68
-
**Elliptical Curves:**
68
+
**Elliptical curves:**
69
69
- NistP384
70
70
- NistP256
71
71
72
-
### Deprecating TLS Configuration
72
+
### Deprecating TLS configuration
73
73
> [!WARNING]
74
-
> After 31 October 2024, protocol versions TLS 1.0 and 1.1 support will be completely removed. In addition, the following Cipher Suites and Elliptical Curves will be retired.
74
+
> After 31 October 2024, protocol versions TLS 1.0 and 1.1 support will be completely removed. In addition, the following Cipher suites and Elliptical curves will be retired.
75
75
76
76
#### TLS 1.0
77
-
**Cipher Suites**
77
+
**Cipher suites**
78
78
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
79
79
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
80
80
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
81
81
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
82
82
- TLS_RSA_WITH_AES_256_CBC_SHA
83
83
- TLS_RSA_WITH_AES_128_CBC_SHA
84
84
85
-
**Elliptical Curves**
85
+
**Elliptical curves**
86
86
- curve25519
87
87
88
88
#### TLS 1.1
89
-
**Cipher Suites:**
89
+
**Cipher suites:**
90
90
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
91
91
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
92
92
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
93
93
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
94
94
- TLS_RSA_WITH_AES_256_CBC_SHA
95
95
- TLS_RSA_WITH_AES_128_CBC_SHA
96
96
97
-
**Elliptical Curves**
97
+
**Elliptical curves**
98
98
- curve25519
99
99
100
100
> [!NOTE]
101
-
> After 31 October 2024, only the listed Cipher Suites and Elliptical Curves within these TLS 1.2 and TLS 1.3 will be retired.
101
+
> After 31 October 2024, only the listed Cipher suites and Elliptical curves within these TLS 1.2 and TLS 1.3 will be retired.
102
102
103
103
#### TLS 1.2
104
-
**Cipher Suites**
104
+
**Cipher suites**
105
105
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
106
106
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
107
107
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
@@ -113,11 +113,11 @@ TLS protocol versions 1.2 and 1.3 are supported encryption mechanisms for Availa
0 commit comments