Skip to content

Commit 7fb6bae

Browse files
authored
Fixed all the external links and Hence's
Fixed all the external links and Hence's
1 parent eed6ff6 commit 7fb6bae

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/application-gateway/configuration-overview.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ For a path-based rule, add multiple back-end HTTP settings that correspond to ea
206206

207207
If redirection is configured for a basic rule, all requests on the associated listener are redirected to the target. This is *global* redirection. If redirection is configured for a path-based rule, only requests in a specific site area are redirected. An example is a shopping cart area that's denoted by */cart/\**. This is *path-based* redirection.
208208

209-
For more information about redirects, see [Application Gateway redirect overview](https://docs.microsoft.com/azure/application-gateway/redirect-overview).
209+
For more information about redirects, see [Application Gateway redirect overview](redirect-overview.md).
210210

211211
#### Redirection type
212212

@@ -223,24 +223,24 @@ Choose listener as the redirection target to redirect traffic from one listener
223223
![Application Gateway components dialog box](./media/configuration-overview/configure-redirection.png)
224224

225225
For more information about HTTP-to-HTTPS redirection, see:
226-
- [HTTP-to-HTTPS redirection by using the Azure portal](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-portal)
227-
- [HTTP-to-HTTPS redirection by using PowerShell](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-powershell)
228-
- [HTTP-to-HTTPS redirection by using the Azure CLI](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-cli)
226+
- [HTTP-to-HTTPS redirection by using the Azure portal](redirect-http-to-https-portal.md)
227+
- [HTTP-to-HTTPS redirection by using PowerShell](redirect-http-to-https-powershell.md)
228+
- [HTTP-to-HTTPS redirection by using the Azure CLI](redirect-http-to-https-cli.md)
229229

230230
##### External site
231231

232232
Choose external site when you want to redirect the traffic on the listener that's associated with this rule to an external site. You can choose to include the query string from the original request in the request that's forwarded to the redirection target. You can't forward the path to the external site that was in the original request.
233233

234234
For more information about redirection, see:
235-
- [Redirect traffic to an external site by using PowerShell](https://docs.microsoft.com/azure/application-gateway/redirect-external-site-powershell)
236-
- [Redirect traffic to an external site by using the CLI](https://docs.microsoft.com/azure/application-gateway/redirect-external-site-cli)
235+
- [Redirect traffic to an external site by using PowerShell](redirect-external-site-powershell.md)
236+
- [Redirect traffic to an external site by using the CLI](redirect-external-site-cli.md)
237237

238238
#### Rewrite the HTTP header setting
239239

240240
This setting adds, removes, or updates HTTP request and response headers while the request and response packets move between the client and back-end pools. For more information, see:
241241

242-
- [Rewrite HTTP headers overview](https://docs.microsoft.com/azure/application-gateway/rewrite-http-headers)
243-
- [Configure HTTP header rewrite](https://docs.microsoft.com/azure/application-gateway/rewrite-http-headers-portal)
242+
- [Rewrite HTTP headers overview](rewrite-http-headers.md)
243+
- [Configure HTTP header rewrite](rewrite-http-headers-portal.md)
244244

245245
## HTTP settings
246246

@@ -259,8 +259,8 @@ To support this change, Application Gateway (all the SKU types) will be injectin
259259
Please note that the default affinity cookie name is **ApplicationGatewayAffinity** and this can be changed by the users. In case you are using a custom affinity cookie name, an additional cookie will be added with CORS as suffix, for example, **CustomCookieNameCORS**.
260260

261261
> [!NOTE]
262-
> It is mandatory that if the attribute **SameSite=None** is set, the cookie also should contain the **Secure** flag and should be sent over **HTTPS**. Hence, if session affinity is required over CORS, you must migrate your workload to HTTPS.
263-
Please refer to SSL offload and End-to-End SSL documentation for Application Gateway here – [Overview](https://docs.microsoft.com/azure/application-gateway/ssl-overview), [How-to configure SSL offload](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal), [How-to configure End-to-End SSL](https://docs.microsoft.com/azure/application-gateway/end-to-end-ssl-portal).
262+
> It is mandatory that if the attribute **SameSite=None** is set, the cookie also should contain the **Secure** flag and should be sent over **HTTPS**. So if session affinity is required over CORS, you must migrate your workload to HTTPS.
263+
Please refer to SSL offload and End-to-End SSL documentation for Application Gateway here – [Overview](ssl-overview.md), [How-to configure SSL offload](create-ssl-portal.md), [How-to configure End-to-End SSL](end-to-end-ssl-portal.md).
264264

265265
### Connection draining
266266

@@ -270,7 +270,7 @@ Connection draining helps you gracefully remove back-end pool members during pla
270270

271271
Application Gateway supports both HTTP and HTTPS for routing requests to the back-end servers. If you choose HTTP, traffic to the back-end servers is unencrypted. If unencrypted communication isn't acceptable, choose HTTPS.
272272

273-
This setting combined with HTTPS in the listener supports [end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview). This allows you to securely transmit sensitive data encrypted to the back end. Each back-end server in the back-end pool that has end-to-end SSL enabled must be configured with a certificate to allow secure communication.
273+
This setting combined with HTTPS in the listener supports [end-to-end SSL](ssl-overview.md). This allows you to securely transmit sensitive data encrypted to the back end. Each back-end server in the back-end pool that has end-to-end SSL enabled must be configured with a certificate to allow secure communication.
274274

275275
### Port
276276

@@ -309,7 +309,7 @@ This is a UI only shortcut that selects the two required settings for the Azure
309309

310310
### Use custom probe
311311

312-
This setting associates a [custom probe](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#custom-health-probe) with an HTTP setting. You can associate only one custom probe with an HTTP setting. If you don't explicitly associate a custom probe, the [default probe](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#default-health-probe-settings) is used to monitor the health of the back end. We recommend that you create a custom probe for greater control over the health monitoring of your back ends.
312+
This setting associates a [custom probe](application-gateway-probe-overview.md#custom-health-probe) with an HTTP setting. You can associate only one custom probe with an HTTP setting. If you don't explicitly associate a custom probe, the [default probe](application-gateway-probe-overview.md#default-health-probe-settings) is used to monitor the health of the back end. We recommend that you create a custom probe for greater control over the health monitoring of your back ends.
313313

314314
> [!NOTE]
315315
> The custom probe doesn't monitor the health of the back-end pool unless the corresponding HTTP setting is explicitly associated with a listener.
@@ -343,7 +343,7 @@ After you create a back-end pool, you must associate it with one or more request
343343

344344
## Health probes
345345

346-
An application gateway monitors the health of all resources in its back end by default. But we strongly recommend that you create a custom probe for each back-end HTTP setting to get greater control over health monitoring. To learn how to configure a custom probe, see [Custom health probe settings](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#custom-health-probe-settings).
346+
An application gateway monitors the health of all resources in its back end by default. But we strongly recommend that you create a custom probe for each back-end HTTP setting to get greater control over health monitoring. To learn how to configure a custom probe, see [Custom health probe settings](application-gateway-probe-overview.md#custom-health-probe-settings).
347347

348348
> [!NOTE]
349349
> After you create a custom health probe, you need to associate it to a back-end HTTP setting. A custom probe won't monitor the health of the back-end pool unless the corresponding HTTP setting is explicitly associated with a listener using a rule.

0 commit comments

Comments
 (0)