You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-overview.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -206,7 +206,7 @@ For a path-based rule, add multiple back-end HTTP settings that correspond to ea
206
206
207
207
If redirection is configured for a basic rule, all requests on the associated listener are redirected to the target. This is *global* redirection. If redirection is configured for a path-based rule, only requests in a specific site area are redirected. An example is a shopping cart area that's denoted by */cart/\**. This is *path-based* redirection.
208
208
209
-
For more information about redirects, see [Application Gateway redirect overview](https://docs.microsoft.com/azure/application-gateway/redirect-overview).
209
+
For more information about redirects, see [Application Gateway redirect overview](redirect-overview.md).
210
210
211
211
#### Redirection type
212
212
@@ -223,24 +223,24 @@ Choose listener as the redirection target to redirect traffic from one listener
For more information about HTTP-to-HTTPS redirection, see:
226
-
-[HTTP-to-HTTPS redirection by using the Azure portal](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-portal)
227
-
-[HTTP-to-HTTPS redirection by using PowerShell](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-powershell)
228
-
-[HTTP-to-HTTPS redirection by using the Azure CLI](https://docs.microsoft.com/azure/application-gateway/redirect-http-to-https-cli)
226
+
-[HTTP-to-HTTPS redirection by using the Azure portal](redirect-http-to-https-portal.md)
227
+
-[HTTP-to-HTTPS redirection by using PowerShell](redirect-http-to-https-powershell.md)
228
+
-[HTTP-to-HTTPS redirection by using the Azure CLI](redirect-http-to-https-cli.md)
229
229
230
230
##### External site
231
231
232
232
Choose external site when you want to redirect the traffic on the listener that's associated with this rule to an external site. You can choose to include the query string from the original request in the request that's forwarded to the redirection target. You can't forward the path to the external site that was in the original request.
233
233
234
234
For more information about redirection, see:
235
-
-[Redirect traffic to an external site by using PowerShell](https://docs.microsoft.com/azure/application-gateway/redirect-external-site-powershell)
236
-
-[Redirect traffic to an external site by using the CLI](https://docs.microsoft.com/azure/application-gateway/redirect-external-site-cli)
235
+
-[Redirect traffic to an external site by using PowerShell](redirect-external-site-powershell.md)
236
+
-[Redirect traffic to an external site by using the CLI](redirect-external-site-cli.md)
237
237
238
238
#### Rewrite the HTTP header setting
239
239
240
240
This setting adds, removes, or updates HTTP request and response headers while the request and response packets move between the client and back-end pools. For more information, see:
@@ -259,8 +259,8 @@ To support this change, Application Gateway (all the SKU types) will be injectin
259
259
Please note that the default affinity cookie name is **ApplicationGatewayAffinity** and this can be changed by the users. In case you are using a custom affinity cookie name, an additional cookie will be added with CORS as suffix, for example, **CustomCookieNameCORS**.
260
260
261
261
> [!NOTE]
262
-
> It is mandatory that if the attribute **SameSite=None** is set, the cookie also should contain the **Secure** flag and should be sent over **HTTPS**. Hence, if session affinity is required over CORS, you must migrate your workload to HTTPS.
263
-
Please refer to SSL offload and End-to-End SSL documentation for Application Gateway here – [Overview](https://docs.microsoft.com/azure/application-gateway/ssl-overview), [How-to configure SSL offload](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal), [How-to configure End-to-End SSL](https://docs.microsoft.com/azure/application-gateway/end-to-end-ssl-portal).
262
+
> It is mandatory that if the attribute **SameSite=None** is set, the cookie also should contain the **Secure** flag and should be sent over **HTTPS**. So if session affinity is required over CORS, you must migrate your workload to HTTPS.
263
+
Please refer to SSL offload and End-to-End SSL documentation for Application Gateway here – [Overview](ssl-overview.md), [How-to configure SSL offload](create-ssl-portal.md), [How-to configure End-to-End SSL](end-to-end-ssl-portal.md).
264
264
265
265
### Connection draining
266
266
@@ -270,7 +270,7 @@ Connection draining helps you gracefully remove back-end pool members during pla
270
270
271
271
Application Gateway supports both HTTP and HTTPS for routing requests to the back-end servers. If you choose HTTP, traffic to the back-end servers is unencrypted. If unencrypted communication isn't acceptable, choose HTTPS.
272
272
273
-
This setting combined with HTTPS in the listener supports [end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview). This allows you to securely transmit sensitive data encrypted to the back end. Each back-end server in the back-end pool that has end-to-end SSL enabled must be configured with a certificate to allow secure communication.
273
+
This setting combined with HTTPS in the listener supports [end-to-end SSL](ssl-overview.md). This allows you to securely transmit sensitive data encrypted to the back end. Each back-end server in the back-end pool that has end-to-end SSL enabled must be configured with a certificate to allow secure communication.
274
274
275
275
### Port
276
276
@@ -309,7 +309,7 @@ This is a UI only shortcut that selects the two required settings for the Azure
309
309
310
310
### Use custom probe
311
311
312
-
This setting associates a [custom probe](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#custom-health-probe) with an HTTP setting. You can associate only one custom probe with an HTTP setting. If you don't explicitly associate a custom probe, the [default probe](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#default-health-probe-settings) is used to monitor the health of the back end. We recommend that you create a custom probe for greater control over the health monitoring of your back ends.
312
+
This setting associates a [custom probe](application-gateway-probe-overview.md#custom-health-probe) with an HTTP setting. You can associate only one custom probe with an HTTP setting. If you don't explicitly associate a custom probe, the [default probe](application-gateway-probe-overview.md#default-health-probe-settings) is used to monitor the health of the back end. We recommend that you create a custom probe for greater control over the health monitoring of your back ends.
313
313
314
314
> [!NOTE]
315
315
> The custom probe doesn't monitor the health of the back-end pool unless the corresponding HTTP setting is explicitly associated with a listener.
@@ -343,7 +343,7 @@ After you create a back-end pool, you must associate it with one or more request
343
343
344
344
## Health probes
345
345
346
-
An application gateway monitors the health of all resources in its back end by default. But we strongly recommend that you create a custom probe for each back-end HTTP setting to get greater control over health monitoring. To learn how to configure a custom probe, see [Custom health probe settings](https://docs.microsoft.com/azure/application-gateway/application-gateway-probe-overview#custom-health-probe-settings).
346
+
An application gateway monitors the health of all resources in its back end by default. But we strongly recommend that you create a custom probe for each back-end HTTP setting to get greater control over health monitoring. To learn how to configure a custom probe, see [Custom health probe settings](application-gateway-probe-overview.md#custom-health-probe-settings).
347
347
348
348
> [!NOTE]
349
349
> After you create a custom health probe, you need to associate it to a back-end HTTP setting. A custom probe won't monitor the health of the back-end pool unless the corresponding HTTP setting is explicitly associated with a listener using a rule.
0 commit comments