You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-backend-health-troubleshooting.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ session on the port specified, the probe is marked as Unhealthy with this messag
195
195
**Message:** Status code of the backend\'s HTTP response did not match
196
196
the probe setting. Expected:{HTTPStatusCode0} Received:{HTTPStatusCode1}.
197
197
198
-
**Cause:** After the TCP connection has been established and an SSL handshake is done (if SSL is enabled), Application Gateway will send the probe as an HTTP GET request to the backend server. As described earlier, the default probe will be to \<protocol\>://127.0.0.1:\<port\>/, and it
198
+
**Cause:** After the TCP connection has been established and a TLS handshake is done (if TLS is enabled), Application Gateway will send the probe as an HTTP GET request to the backend server. As described earlier, the default probe will be to \<protocol\>://127.0.0.1:\<port\>/, and it
199
199
considers response status codes in the rage 200 through 399 as Healthy. If the server returns any other status code, it will be marked as Unhealthy with this message.
200
200
201
201
**Solution:** Depending on the backend server's response code, you can
@@ -243,7 +243,7 @@ a well-known Certificate Authority (CA). Whitelist the backend on the Applicatio
243
243
244
244
**Cause:** End-to-end SSL with Application Gateway v2 requires the
245
245
backend server's certificate to be verified in order to deem the server Healthy.
246
-
For an SSL certificate to be trusted, that certificate of the backend
246
+
For a TLS/SSL certificate to be trusted, that certificate of the backend
247
247
server must be issued by a CA that's included in the trusted
248
248
store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, if a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
249
249
@@ -283,7 +283,7 @@ whitelist the backend
283
283
284
284
**Cause:** End-to-end SSL with Application Gateway v2 requires the
285
285
backend server's certificate to be verified in order to deem the server Healthy.
286
-
For an SSL certificate to be trusted, the backend
286
+
For a TLS/SSL certificate to be trusted, the backend
287
287
server certificate must be issued by a CA that's included in the trusted store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
288
288
289
289
The certificate that has been uploaded to Application Gateway HTTP settings must match the root certificate of the backend server certificate.
@@ -325,7 +325,7 @@ If the output doesn't show the complete chain of the certificate being returned,
325
325
326
326
**Message:** The Common Name (CN) of the backend certificate does not match the host header of the probe.
327
327
328
-
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s SSL certificate. This is Standard_v2 and WAF_v2 SKU behavior. The Standard and WAF SKU’s Server Name Indication (SNI) is set as the FQDN in the backend pool address.
328
+
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s TLS/SSL certificate. This is Standard_v2 and WAF_v2 SKU behavior. The Standard and WAF SKU’s Server Name Indication (SNI) is set as the FQDN in the backend pool address.
329
329
330
330
In the v2 SKU, if there's a default probe (no custom probe has been configured and associated), SNI will be set from the host name mentioned in the HTTP settings. Or, if “Pick host name from backend address” is mentioned in the HTTP settings, where the backend address pool contains a valid FQDN, this setting will be applied.
331
331
@@ -367,10 +367,10 @@ For Linux using OpenSSL:
367
367
368
368
**Message:** Backend certificate is invalid. Current date is not within the \"Valid from\" and \"Valid to\" date range on the certificate.
369
369
370
-
**Cause:** Every certificate comes with a validity range, and the HTTPS connection won't be secure unless the server's SSL certificate is valid. The current data must be within the **valid from** and **valid to** range. If it's not, the certificate is considered invalid, and that will create a
370
+
**Cause:** Every certificate comes with a validity range, and the HTTPS connection won't be secure unless the server's TLS/SSL certificate is valid. The current data must be within the **valid from** and **valid to** range. If it's not, the certificate is considered invalid, and that will create a
371
371
security issue in which Application Gateway marks the backend server as Unhealthy.
372
372
373
-
**Solution:** If your SSL certificate has expired, renew the certificate
373
+
**Solution:** If your TLS/SSL certificate has expired, renew the certificate
374
374
with your vendor and update the server settings with the new
375
375
certificate. If it's a self-signed certificate, you must generate a valid certificate and upload the root certificate to the Application Gateway HTTP settings. To do that, follow these steps:
376
376
@@ -383,7 +383,7 @@ certificate. If it's a self-signed certificate, you must generate a valid certif
383
383
#### Certificate verification failed
384
384
385
385
**Message:** The validity of the backend certificate could not be
386
-
verified. To find out the reason, check Open SSL diagnostics for the
386
+
verified. To find out the reason, check OpenSSL diagnostics for the
387
387
message associated with error code {errorCode}
388
388
389
389
**Cause:** This error occurs when Application Gateway can't verify the validity of the certificate.
0 commit comments