Skip to content

Commit 5d9d400

Browse files
authored
Merge pull request #109851 from TimShererWithAquent/us1679050cv
Change SSL to TLS per 1679050
2 parents c29deb4 + f5ec2aa commit 5d9d400

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ session on the port specified, the probe is marked as Unhealthy with this messag
195195
**Message:** Status code of the backend\'s HTTP response did not match
196196
the probe setting. Expected:{HTTPStatusCode0} Received:{HTTPStatusCode1}.
197197
198-
**Cause:** After the TCP connection has been established and an SSL handshake is done (if SSL is enabled), Application Gateway will send the probe as an HTTP GET request to the backend server. As described earlier, the default probe will be to \<protocol\>://127.0.0.1:\<port\>/, and it
198+
**Cause:** After the TCP connection has been established and a TLS handshake is done (if TLS is enabled), Application Gateway will send the probe as an HTTP GET request to the backend server. As described earlier, the default probe will be to \<protocol\>://127.0.0.1:\<port\>/, and it
199199
considers response status codes in the rage 200 through 399 as Healthy. If the server returns any other status code, it will be marked as Unhealthy with this message.
200200
201201
**Solution:** Depending on the backend server's response code, you can
@@ -243,7 +243,7 @@ a well-known Certificate Authority (CA). Whitelist the backend on the Applicatio
243243
244244
**Cause:** End-to-end SSL with Application Gateway v2 requires the
245245
backend server's certificate to be verified in order to deem the server Healthy.
246-
For an SSL certificate to be trusted, that certificate of the backend
246+
For a TLS/SSL certificate to be trusted, that certificate of the backend
247247
server must be issued by a CA that's included in the trusted
248248
store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, if a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
249249
@@ -283,7 +283,7 @@ whitelist the backend
283283
284284
**Cause:** End-to-end SSL with Application Gateway v2 requires the
285285
backend server's certificate to be verified in order to deem the server Healthy.
286-
For an SSL certificate to be trusted, the backend
286+
For a TLS/SSL certificate to be trusted, the backend
287287
server certificate must be issued by a CA that's included in the trusted store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
288288
289289
The certificate that has been uploaded to Application Gateway HTTP settings must match the root certificate of the backend server certificate.
@@ -325,7 +325,7 @@ If the output doesn't show the complete chain of the certificate being returned,
325325
326326
**Message:** The Common Name (CN) of the backend certificate does not match the host header of the probe.
327327
328-
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s SSL certificate. This is Standard_v2 and WAF_v2 SKU behavior. The Standard and WAF SKU’s Server Name Indication (SNI) is set as the FQDN in the backend pool address.
328+
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s TLS/SSL certificate. This is Standard_v2 and WAF_v2 SKU behavior. The Standard and WAF SKU’s Server Name Indication (SNI) is set as the FQDN in the backend pool address.
329329
330330
In the v2 SKU, if there's a default probe (no custom probe has been configured and associated), SNI will be set from the host name mentioned in the HTTP settings. Or, if “Pick host name from backend address” is mentioned in the HTTP settings, where the backend address pool contains a valid FQDN, this setting will be applied.
331331
@@ -367,10 +367,10 @@ For Linux using OpenSSL:
367367
368368
**Message:** Backend certificate is invalid. Current date is not within the \"Valid from\" and \"Valid to\" date range on the certificate.
369369
370-
**Cause:** Every certificate comes with a validity range, and the HTTPS connection won't be secure unless the server's SSL certificate is valid. The current data must be within the **valid from** and **valid to** range. If it's not, the certificate is considered invalid, and that will create a
370+
**Cause:** Every certificate comes with a validity range, and the HTTPS connection won't be secure unless the server's TLS/SSL certificate is valid. The current data must be within the **valid from** and **valid to** range. If it's not, the certificate is considered invalid, and that will create a
371371
security issue in which Application Gateway marks the backend server as Unhealthy.
372372
373-
**Solution:** If your SSL certificate has expired, renew the certificate
373+
**Solution:** If your TLS/SSL certificate has expired, renew the certificate
374374
with your vendor and update the server settings with the new
375375
certificate. If it's a self-signed certificate, you must generate a valid certificate and upload the root certificate to the Application Gateway HTTP settings. To do that, follow these steps:
376376
@@ -383,7 +383,7 @@ certificate. If it's a self-signed certificate, you must generate a valid certif
383383
#### Certificate verification failed
384384
385385
**Message:** The validity of the backend certificate could not be
386-
verified. To find out the reason, check Open SSL diagnostics for the
386+
verified. To find out the reason, check OpenSSL diagnostics for the
387387
message associated with error code {errorCode}
388388
389389
**Cause:** This error occurs when Application Gateway can't verify the validity of the certificate.

0 commit comments

Comments
 (0)