Skip to content

Commit 3945bd4

Browse files
authored
Update application-gateway-backend-health-troubleshooting.md
minor changes to increase acrolinx scores
1 parent 3cfd5d1 commit 3945bd4

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ To increase the timeout value, follow these steps:
123123
**Solution:** If you receive this error, follow these steps:
124124

125125
1. Check whether you can connect to the backend server on the port mentioned in the HTTP settings by using a browser or PowerShell. For example, run the following command: `Test-NetConnection -ComputerName www.bing.com -Port 443`.
126-
2. If the port mentioned is not the desired port, enter the correct port number for Application Gateway to connect to the backend server.
126+
2. If the port mentioned isn't the desired port, enter the correct port number for Application Gateway to connect to the backend server.
127127
3. If you can't connect on the port from your local machine as well, then:
128128

129129
a. Check the network security group (NSG) settings of the backend server's network adapter and subnet and whether inbound connections to the configured port are allowed. If they aren't, create a new rule to allow the connections. To learn how to create NSG rules, [see the documentation page](../virtual-network/tutorial-filter-network-traffic.md#create-security-rules).
@@ -235,7 +235,7 @@ Run this OpenSSL command by specifying the right certificate filename ` openssl
235235

236236
### Backend certificate has expired
237237

238-
**Message:** Backend certificate is invalid. Current date is not within the "Valid from" and "Valid to" date range on the certificate.
238+
**Message:** Backend certificate is invalid. Current date isn't within the "Valid from" and "Valid to" date range on the certificate.
239239

240240
**Cause:** An expired certificate is deemed unsafe and hence the application gateway marks the backend server with an expired certificate as unhealthy.
241241

@@ -256,7 +256,7 @@ For V1 SKU,
256256
### The intermediate certificate was not found
257257
**Message:** The **Intermediate certificate is missing** from the certificate chain presented by the backend server. Ensure the certificate chain is complete and correctly ordered on the backend server.
258258

259-
**Cause:** The intermediate certificate(s) is not installed in the certificate chain on the backend server.
259+
**Cause:** The intermediate certificate(s) isn't installed in the certificate chain on the backend server.
260260

261261
**Solution:** An Intermediate certificate is used to sign the Leaf certificate and is thus needed to complete the chain. Check with your Certificate Authority (CA) for the necessary Intermediate certificate(s) and install them on your backend server. This chain must start with the Leaf Certificate, then the Intermediate certificate(s), and finally, the Root CA certificate. We recommend installing the complete chain on the backend server, including the Root CA certificate. For reference, look at the certificate chain example under [Leaf must be topmost in chain](application-gateway-backend-health-troubleshooting.md#leaf-must-be-topmost-in-chain).
262262

@@ -275,16 +275,16 @@ These images show the difference between the self-signed certificates.
275275

276276
### Server certificate is not issued by a publicly known CA
277277

278-
**Message:** The backend **Server certificate** is not signed by a well-known Certificate Authority (CA). To use unknown CA certificates, its Root certificate must be uploaded to the Backend Setting of the application gateway.
278+
**Message:** The backend **Server certificate** isn't signed by a well-known Certificate Authority (CA). To use unknown CA certificates, its Root certificate must be uploaded to the Backend Setting of the application gateway.
279279

280-
**Cause:** You have chosen “well-known CA certificate” in the backend setting, but the Root certificate presented by the backend server is not publicly known.
280+
**Cause:** You have chosen “well-known CA certificate” in the backend setting, but the Root certificate presented by the backend server isn't publicly known.
281281

282282
**Solution:** When a Leaf certificate is issued by a private Certificate Authority (CA), the signing Root CA’s certificate must be uploaded to the application gateway’s associated Backend Setting. This enables your application gateway to establish a trusted connection with that backend server. To fix this, go to the associated backend setting, choose “not a well-known CA” and upload the Root CA certificate (.CER). To identify and download the root certificate, you can follow the same steps as described under [Trusted root certificate mismatch](application-gateway-backend-health-troubleshooting.md#trusted-root-certificate-mismatch-root-certificate-is-available-on-the-backend-server).
283283

284284
### The Intermediate certificate is NOT signed by a publicly known CA.
285-
**Message:** The **Intermediate certificate** is not signed by a well-known Certificate Authority (CA). Ensure the certificate chain is complete and correctly ordered on the backend server.
285+
**Message:** The **Intermediate certificate** isn't signed by a well-known Certificate Authority (CA). Ensure the certificate chain is complete and correctly ordered on the backend server.
286286

287-
**Cause:** You have chosen “well-known CA certificate” in the backend setting, but the Intermediate certificate presented by the backend server is not signed by any publicly known CA.
287+
**Cause:** You have chosen “well-known CA certificate” in the backend setting, but the Intermediate certificate presented by the backend server isn't signed by any publicly known CA.
288288

289289
**Solution:** When a certificate is issued by a private Certificate Authority (CA), the signing Root CA’s certificate must be uploaded to the application gateway’s associated Backend Setting. This enables your application gateway to establish a trusted connection with that backend server. To fix this, contact your private CA to get the appropriate Root CA certificate (.CER) and upload that .CER file to the Backend Setting of your application gateway by selecting “not a well-known CA”. We also recommend installing the complete chain on the backend server, including the Root CA certificate, for easy verification.
290290

@@ -332,9 +332,9 @@ These images show the difference between the self-signed certificates.
332332

333333
### Leaf must be topmost in chain.
334334

335-
**Message:** The Leaf certificate is not the topmost certificate in the chain presented by the backend server. Ensure the certificate chain is correctly ordered on the backend server.
335+
**Message:** The Leaf certificate isn't the topmost certificate in the chain presented by the backend server. Ensure the certificate chain is correctly ordered on the backend server.
336336

337-
**Cause:** The Leaf (also known as Domain or Server) certificate is not installed in the correct order on the backend server.
337+
**Cause:** The Leaf (also known as Domain or Server) certificate isn't installed in the correct order on the backend server.
338338

339339
**Solution:** The certificate installation on the backend server must include an ordered list of certificates comprising the leaf certificate and all its signing certificates (Intermediate and Root CA certificates). This chain must start with the leaf certificate, then the Intermediate certificate(s), and finally, the Root CA certificate. We recommend installing the complete chain on the backend server, including the Root CA certificate.
340340

0 commit comments

Comments
 (0)