You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-backend-health-troubleshooting.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ applications. This article describes the symptoms, cause, and resolution for eac
35
35
36
36
If the backend health status is **Unhealthy**, the portal view will resemble the following screenshot:
37
37
38
-

38
+
[](./media/application-gateway-backend-health-troubleshooting/appgwunhealthy.png#lightbox)
39
39
40
40
Or if you're using an Azure PowerShell, CLI, or Azure REST API query, you'll get a response that resembles the following example:
41
41
@@ -273,7 +273,7 @@ Run this OpenSSL command by specifying the right certificate filename ` openssl
273
273
**Solution:** The solution depends on which part of the certificate chain has expired on the backend server.
274
274
275
275
For V2 SKU,
276
-
* Expired Leaf (aka Domain or Server) certificate – Renew the server certificate with certificate provider and install the new certificate on the backend server. Ensure that you have installed the complete certificate chain comprising of `Leaf (topmost) > Intermediate(s) > Root`. Based on the type of Certificate Authority (CA), you may take the following actions on your gateway.
276
+
* Expired Leaf (also known as Domain or Server) certificate – Renew the server certificate with certificate provider and install the new certificate on the backend server. Ensure that you have installed the complete certificate chain comprising of `Leaf (topmost) > Intermediate(s) > Root`. Based on the type of Certificate Authority (CA), you may take the following actions on your gateway.
277
277
* Publicly known CA: If the certificate issuer is a well-known CA, you need not take any action on the application gateway.
278
278
* Private CA: If the leaf certificate is issued by a private CA, you need to check if the signing Root CA certificate has changed. In such cases, you must upload the new Root CA certificate (.CER) to the associated Backend setting of your gateway.
279
279
@@ -282,7 +282,7 @@ For V2 SKU,
282
282
* When using a Private CA, if the Root CA certificate itself or the root of the renewed Intermediate certficate has changed, you must upload the new Root certificate to the application gateway’s Backend Setting.
283
283
284
284
For V1 SKU,
285
-
* Renew the expired Leaf (aka Domain or Server) certificate with your CA and upload the same leaf certificate (.CER) to the associated Backend setting of your application gateway.
285
+
* Renew the expired Leaf (also known as Domain or Server) certificate with your CA and upload the same leaf certificate (.CER) to the associated Backend setting of your application gateway.
286
286
287
287
### The intermediate certificate was not found
288
288
**Message:** The **Intermediate certificate is missing** from the certificate chain presented by the backend server. Ensure the certificate chain is complete and correctly ordered on the backend server.
@@ -300,7 +300,7 @@ These images show the difference between the self-signed certificates.
300
300
### The leaf or server certificate was not found
301
301
**Message:** The **Leaf certificate is missing** from the certificate chain presented by the backend server. Ensure the chain is complete and correctly ordered on the backend server.
302
302
303
-
**Cause:** The Leaf (aka Domain or Server) certificate is missing from the certificate chain on the backend server.
303
+
**Cause:** The Leaf (also known as Domain or Server) certificate is missing from the certificate chain on the backend server.
304
304
305
305
**Solution:** You can get the leaf certificate from your Certificate Authority (CA). Install this leaf certificate and all its signing certificates (Intermediate and Root CA certificates) on the backend server. This chain must start with the Leaf Certificate, then the Intermediate certificate(s), and finally, the Root CA certificate. We recommend installing the complete chain on the backend server, including the Root CA certificate. For reference, look at the certificate chain example under [Leaf must be topmost in chain](application-gateway-backend-health-troubleshooting.md#leaf-must-be-topmost-in-chain).
306
306
@@ -330,7 +330,7 @@ These images show the difference between the self-signed certificates.
330
330
331
331
### Trusted root certificate mismatch (Root certificate is available on the backend server)
332
332
333
-
**Message:** The root certificate of the server certificate used by the backend doesn't match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to whitelist the backend.
333
+
**Message:** The root certificate of the server certificate used by the backend doesn't match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to allowlist the backend.
334
334
335
335
**Cause:** This error occurs when none of the Root certificates uploaded to your application gateway’s backend setting matches the Root certificate present on the backend server.
336
336
@@ -365,7 +365,7 @@ These images show the difference between the self-signed certificates.
365
365
366
366
**Message:** The Leaf certificate is not the topmost certificate in the chain presented by the backend server. Ensure the certificate chain is correctly ordered on the backend server.
367
367
368
-
**Cause:** The Leaf (aka Domain or Server) certificate is not installed in the correct order on the backend server.
368
+
**Cause:** The Leaf (also known as Domain or Server) certificate is not installed in the correct order on the backend server.
369
369
370
370
**Solution:** The certificate installation on the backend server must include an ordered list of certificates comprising the leaf certificate and all its signing certificates (Intermediate and Root CA certificates). This chain must start with the leaf certificate, then the Intermediate certificate(s), and finally, the Root CA certificate. We recommend installing the complete chain on the backend server, including the Root CA certificate.
0 commit comments