You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/troubleshoot-issues.md
+55-48Lines changed: 55 additions & 48 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,98 +13,100 @@ ms.author: duau
13
13
14
14
This article describes how to troubleshoot common routing problems that you might face for your Azure Front Door configuration.
15
15
16
-
## Additional debugging HTTP headers
16
+
## Other debugging HTTP headers
17
17
18
-
You can request Front Door to return additional debugging HTTP response headers. For more details, refer to[optional response headers](front-door-http-headers-protocol.md#optional-debug-response-headers).
18
+
You can request Azure Front Door to return more debugging HTTP response headers. For more information, see[optional response headers](front-door-http-headers-protocol.md#optional-debug-response-headers).
19
19
20
20
## 503 response from Azure Front Door after a few seconds
21
21
22
22
### Symptom
23
23
24
24
* Regular requests sent to your backend without going through Azure Front Door are succeeding. Going via Azure Front Door results in 503 error responses.
25
-
* The failure from Azure Front Door typically shows after about 30 seconds.
26
-
* Intermittent 503 errors with log `ErrorInfo: OriginInvalidResponse`.
25
+
* The failure from Azure Front Door typically appears after about 30 seconds.
26
+
* Intermittent 503 errors appear with "ErrorInfo: OriginInvalidResponse."
27
27
28
28
### Cause
29
29
30
30
The cause of this problem can be one of three things:
31
-
32
-
* Your origin is taking longer than the timeout configured (default is 30 seconds) to receive the request from Azure Front Door.
31
+
32
+
* Your origin is taking longer than the timeout configured to receive the request from Azure Front Door. The default is 30 seconds.
33
33
* The time it takes to send a response to the request from Azure Front Door is taking longer than the timeout value.
34
-
*Client sent a byte range request with `Accept-Encoding header` (compression enabled).
34
+
*The client sent a byte range request with an **Accept-Encoding** header, which means compression is enabled.
35
35
36
36
### Troubleshooting steps
37
37
38
-
* Send the request to your backend directly (without going through Azure Front Door). See how long your backend usually takes to respond.
38
+
* Send the request to your backend directly without going through Azure Front Door. See how long your backend usually takes to respond.
39
39
* Send the request via Azure Front Door and see if you're getting any 503 responses. If not, the problem might not be a timeout issue. Contact support.
40
-
* If requests going through Azure Front Door results in a 503 error response code, configure the **Origin response timeout (in seconds)** for the endpoint. You can extend the default timeout to up to 4 minutes (240 seconds). The setting can be configured by going to the *Endpoint manager* and selecting **Edit endpoint**.
40
+
* If requests going through Azure Front Door result in a 503 error response code, configure **Origin response timeout (in seconds)** for the endpoint. You can extend the default timeout to up to 4 minutes, which is 240 seconds. To configure the setting, go to **Endpoint manager** and select **Edit endpoint**.
41
+
42
+
:::image type="content" source="./media/troubleshoot-issues/origin-response-timeout-1.png" alt-text="Screenshot that shows selecting Edit endpoint from Endpoint manager.":::
41
43
42
-
:::image type="content" source="./media/troubleshoot-issues/origin-response-timeout-1.png" alt-text="Screenshot of selecting edit endpoint from Endpoint manager.":::
44
+
Then select **Endpoint properties** to configure **Origin response timeout**.
43
45
44
-
Then select **Endpoint properties** to configure the **Origin response timeout**:
46
+
:::image type="content" source="./media/troubleshoot-issues/origin-response-timeout-2.png" alt-text="Screenshot that shows selecting Endpoint properties and the Origin response timeout field." lightbox="./media/troubleshoot-issues/origin-response-timeout-2-expanded.png":::
45
47
46
-
:::image type="content" source="./media/troubleshoot-issues/origin-response-timeout-2.png" alt-text="Screenshot of select endpoint properties and Origin response timeout field." lightbox="./media/troubleshoot-issues/origin-response-timeout-2-expanded.png":::
48
+
* If the timeout doesn't resolve the issue, use a tool like Fiddler or your browser's developer tool to check if the client is sending byte range requests with **Accept-Encoding** headers. Using this option leads to the origin responding with different content lengths.
47
49
48
-
* If the timeout doesn’t resolve the issue, use a tool like Fiddler or your browser's developer tool to check if the client is sending byte range requests with Accept-Encoding headers, leading to the origin responding with different content lengths. If yes, then you can either disable compression on the Origin/Azure Front Door or create a Rules Set rule to remove `accept-encoding` from the request for byte range requests.
50
+
If the client is sending byte range requests with **Accept-Encoding** headers, you have two options. You can disable compression on the origin/Azure Front Door. Or you can create a rules set rule to remove **Accept-Encoding** from the request for byte range requests.
49
51
50
-
:::image type="content" source="./media/troubleshoot-issues/remove-encoding-rule.png" alt-text="Screenshot of accept-encoding rule in a Rule Set.":::
52
+
:::image type="content" source="./media/troubleshoot-issues/remove-encoding-rule.png" alt-text="Screenshot that shows the Accept-Encoding rule in a rule set.":::
51
53
52
54
## 503 responses from Azure Front Door only for HTTPS
53
55
54
56
### Symptom
55
57
56
-
*503 responses are returned only for AFD HTTPS enabled endpoints
57
-
*Regular requests sent to your backend without going through Azure Front Door are succeeding. Going via Azure Front Door results in 503 error responses.
58
-
*Intermittent 503 errors with log `ErrorInfo: OriginInvalidResponse`
58
+
* Any 503 responses are returned only for Azure Front Door HTTPS-enabled endpoints.
59
+
*Regular requests sent to your backend without going through Azure Front Door are succeeding. Going via Azure Front Door results in 503 error responses.
60
+
*Intermittent 503 errors appear with "ErrorInfo: OriginInvalidResponse."
59
61
60
62
### Cause
63
+
61
64
The cause of this problem can be one of three things:
62
-
* Backend Pool is an IP address
63
-
* Backend Server is returning a certificate that does not match the FQDN of the AFD backend Pool
64
-
* Backend Pool is an Azure Web Apps server
65
+
66
+
* The backend pool is an IP address.
67
+
* The backend server returns a certificate that doesn't match the FQDN of the Azure Front Door backend pool.
68
+
* The backend pool is an Azure Web Apps server.
65
69
66
70
### Troubleshooting steps
67
71
68
-
* Backend Pool is an IP address
72
+
* The backend pool is an IP address.
69
73
70
-
`EnforceCertificateNameCheck` must be disabled.
74
+
`EnforceCertificateNameCheck` must be disabled.
71
75
72
-
AFD has a switch called "enforceCertificateNameCheck". By default, this setting is enabled. When enabled, AFD checks that the backend pool host name FQDN matches the backend server certificate's Certificate Name (CN) or one of the entries in the Subject Alternative Names (SAN) extension.
76
+
Azure Front Door has a switch called `EnforceCertificateNameCheck`. By default, this setting is enabled. When enabled, Azure Front Door checks that the backend pool host name FQDN matches the backend server certificate's certificate name or one of the entries in the subject alternative names extension.
73
77
74
-
How to disable EnforceCertifiateNameCheck from Portal:
78
+
-How to disable `EnforceCertificateNameCheck` from the Azure portal:
75
79
76
-
In the portal there is a toggle button, that will allow you to turn this on/off in the Azure Front Door Design Blade.
80
+
In the portal, use a toggle buttonto turn this setting on or off in the Azure Front Door **Design** pane.

79
83
80
-
* Backend Server is returning a certificate that does not match the FQDN of the AFD backend Pool
84
+
* The backend server returns a certificate that doesn't match the FQDN of the Azure Front Door backend pool. To resolve this issue, you have two options:
81
85
82
-
- To resolve we will either need the certificate returned to match the FQDN (or)
83
-
84
-
- The EnforceCertificateNameCheck must be disabled
86
+
- The returned certificate must match the FQDN.
87
+
-`EnforceCertificateNameCheck` must be disabled.
85
88
86
-
* Backend Pool is an Azure Web Apps server
89
+
* The backend pool is an Azure Web Apps server:
87
90
88
-
- Check if Azure web app is configured with Ip Based SSL instead of SNI based. If it’s configured as IpBased then this should be changed to SNI.
89
-
90
-
- If the backend is unhealthy due to a certificate failure, we will return a 503. You can verify the health of the backends on port 80 and 443. If only 443 is unhealthy, this is likely an issue with SSL. Since the backend is configured to use the FQDN, we know it’s sending SNI.
91
+
- Check if the Azure web app is configured with IP-based SSL instead of being SNI based. If the web app is configured as IP based, it should be changed to SNI.
92
+
- If the backend is unhealthy because of a certificate failure, a 503 error message is returned. You can verify the health of the backends on ports 80 and 443. If only 443 is unhealthy, it's likely an issue with SSL. Because the backend is configured to use the FQDN, we know it's sending SNI.
91
93
92
-
Using OPENSSL, verify the certificate that is being returned. To do this, connect to the backend using "-servername" and it should return the SNI which needs to match with the FQDN of the backend pool.
94
+
Use OPENSSL to verify the certificate that's being returned. To do this check, connect to the backend by using `-servername`. It should return the SNI, which needs to match with the FQDN of the backend pool:
## Requests sent to the custom domain return a 400 status code
97
99
98
100
### Symptom
99
101
100
-
* You created an Azure Front Door instance, but a request to the domain or frontend host is returning an HTTP 400 status code.
101
-
* You created a DNS mapping for a custom domain to the frontend host that you configured. However, sending a request to the custom domain host name returns an HTTP 400 status code. It doesn't appear to route to the backend that you configured.
102
+
* You created an Azure Front Door instance. A request to the domain or frontend host returns an HTTP 400 status code.
103
+
* You created a DNS mapping for a custom domain to the frontend host that you configured. Sending a request to the custom domain host name returns an HTTP 400 status code. It doesn't appear to route to the backend that you configured.
102
104
103
105
### Cause
104
106
105
-
The problem occurs if you didn't configure a routing rule for the custom domain that was added as the frontend host. A routing rule needs to be explicitly added for that frontend host. That's true even if a routing rule has already been configured for the frontend host under the Azure Front Door subdomain (*.azurefd.net).
107
+
The problem occurs if you didn't configure a routing rule for the custom domain that was added as the frontend host. A routing rule needs to be explicitly added for that frontend host. That's true even if a routing rule was already configured for the frontend host under the Azure Front Door subdomain, which is ***.azurefd.net**.
106
108
107
-
### Troubleshooting steps
109
+
### Troubleshooting step
108
110
109
111
Add a routing rule for the custom domain to direct traffic to the selected origin group.
110
112
@@ -116,7 +118,7 @@ Azure Front Door has a routing rule that redirects HTTP to HTTPS, but accessing
116
118
117
119
### Cause
118
120
119
-
This behavior can happen if you didn't configure the routing rules correctly for Azure Front Door. Basically, your current configuration isn't specific and might have conflicting rules.
121
+
This behavior can happen if you didn't configure the routing rules correctly for Azure Front Door. Your current configuration isn't specific and might have conflicting rules.
120
122
121
123
### Troubleshooting steps
122
124
@@ -125,22 +127,27 @@ This behavior can happen if you didn't configure the routing rules correctly for
125
127
126
128
### Symptom
127
129
128
-
You created an Azure Front Door Standard/Premium instance and configured a frontend host, an origin group with at least one origin in it, and a routing rule that connects the frontend host to the origin group. Your content doesn't seem to be available when a request goes to the configured frontend host because an HTTP 411 status code gets returned.
130
+
You created an Azure Front Door Standard/Premium instance and configured:
129
131
130
-
Responses to these requests might also contain an HTML error page in the response body that includes an explanatory statement. For example: `HTTP Error 411. The request must be chunked or have a content length`.
132
+
- A frontend host.
133
+
- An origin group with at least one origin in it.
134
+
- A routing rule that connects the frontend host to the origin group.
135
+
136
+
Your content doesn't seem to be available when a request goes to the configured frontend host because an HTTP 411 status code gets returned.
137
+
138
+
Responses to these requests might also contain an HTML error page in the response body that includes an explanatory statement. An example is "HTTP Error 411. The request must be chunked or have a content length."
131
139
132
140
### Cause
133
141
134
-
There are several possible causes for this symptom. The overall reason is that your HTTP request isn't fully RFC-compliant.
142
+
There are several possible causes for this symptom. The overall reason is that your HTTP request isn't fully RFC-compliant.
135
143
136
-
An example of noncompliance is a `POST` request sent without either a `Content-Length` or a `Transfer-Encoding` header (for example, using `curl -X POST https://example-front-door.domain.com`). This request doesn't meet the requirements set out in [RFC 7230](https://tools.ietf.org/html/rfc7230#section-3.3.2). Azure Front Door would block it with an HTTP 411 response.
144
+
An example of noncompliance is a `POST` request sent without either a **Content-Length** or a **Transfer-Encoding** header. An example would be using `curl -X POST https://example-front-door.domain.com`. This request doesn't meet the requirements set out in [RFC 7230](https://tools.ietf.org/html/rfc7230#section-3.3.2). Azure Front Door would block it with an HTTP 411 response.
137
145
138
-
This behavior is separate from the Web Application Firewall (WAF) functionality of Azure Front Door. Currently, there's no way to disable this behavior. All HTTP requests must meet the requirements, even if the WAF functionality isn't in use.
146
+
This behavior is separate from the web application firewall (WAF) functionality of Azure Front Door. Currently, there's no way to disable this behavior. All HTTP requests must meet the requirements, even if the WAF functionality isn't in use.
139
147
140
148
### Troubleshooting steps
141
149
142
150
- Verify that your requests are in compliance with the requirements set out in the necessary RFCs.
143
-
144
151
- Take note of any HTML message body that's returned in response to your request. A message body often explains exactly *how* your request is noncompliant.
0 commit comments