You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/how-to-tcp-tls-proxy.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,38 +34,38 @@ To try out the layer 4 features of Azure Application Gateway, this article shows
34
34
> [!NOTE]
35
35
> When you join the preview, all new Application Gateways provision with the ability to use layer 4 proxy features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can [unregister from the preview](#unregister-from-the-preview).
36
36
37
-
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
37
+
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md).
38
38
39
39
Use the following steps to enroll into the public preview for Application Gateway TCP/TLS proxy using the Azure portal:
40
40
41
41
1. Sign in to the [Azure portal](https://portal.azure.com/).
42
42
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
43
43
44
-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="A screenshot of Azure portal search.":::
44
+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Screenshot of Azure portal search.":::
45
45
46
46
3. Select the link for your subscription's name.
47
47
48
-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="A screenshot selecting the Azure subscription.":::
48
+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Screenshot selecting the Azure subscription.":::
49
49
50
50
4. From the left menu, under **Settings** select **Preview features**.
51
51
52
-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="A screenshot of the Azure preview features menu.":::
52
+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
53
53
54
54
5. You see a list of available preview features and your current registration status.
55
55
56
-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="A screenshot of Azure portal list of preview features listed.":::
56
+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of Azure portal list of preview features listed.":::
57
57
58
58
6. From **Preview features** type into the filter box **AllowApplicationGatewayTlsProxy**, select the feature, and then select **Register**.
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of Azure portal filter preview features.":::
61
61
62
62
## Create a SQL server
63
63
64
64
First, create a SQL Server virtual machine (VM) using the Azure portal.
65
65
66
66
1. From the Azure portal Home page, search for **SQL Virtual Machines** and then select **SQL virtual machines** under **Services**.
67
67
68
-

68
+

69
69
70
70
2. Select **Create** and then on the Select SQL deployment option page, choose a **Free SQL Server License** option from the drop-down menu. For example: **SQL Server 2022 Developer on Windows Server 2022**. You can also select a different Free license version to test.
71
71
@@ -84,12 +84,12 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
84
84
-**Administrator details**: Enter a username and password.
85
85
-**Inbound port rules**: Accept the default settings.
The following table provides more information about the settings used in this procedure.
115
115
@@ -129,15 +129,15 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
129
129
4. Select **Next: Frontends**.
130
130
5. Select a **Frontend IP address type** of **Public** and either use an existing IP address or create a new one.
131
131
132
-
<br><imgsrc="./media/how-to-tcp-tls-proxy/create-a-public-ip-address.png"alt="A screenshot displaying creation of a new public IP address."width="70%">
132
+
<br><imgsrc="./media/how-to-tcp-tls-proxy/create-a-public-ip-address.png"alt="Screenshot displaying creation of a new public IP address."width="70%">
133
133
134
134
6. Select **Next: Backends**.
135
135
7. On the **Backends** tab, select **Add a backend pool**.
136
136
8. Enter details under Add a backend pool:
137
137
-**Name**: Enter a name for the backend pool, for example **sql-vm**.
138
138
-**Target type**: Select **IP address or FQDN** and enter the public IP address of the SQL server virtual machine that you wrote down previously.
139
139
140
-
<imgsrc="./media/how-to-tcp-tls-proxy/add-backend-pool.png"alt="A screenshot displaying backend pool creation."width="60%">
140
+
<imgsrc="./media/how-to-tcp-tls-proxy/add-backend-pool.png"alt="Screenshot displaying backend pool creation."width="60%">
141
141
142
142
9. Select **Add** and then select **Next: Configuration**.
143
143
@@ -149,7 +149,7 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
12. Select **Add** to add the backend settings, and then select **Add** to add the routing rule.
167
167
168
-
<br><imgsrc="./media/how-to-tcp-tls-proxy/add-routing-rule.png"alt="A screenshot adding a routing rule."width="70%">
168
+
<br><imgsrc="./media/how-to-tcp-tls-proxy/add-routing-rule.png"alt="Screenshot adding a routing rule."width="70%">
169
169
170
170
13. Select **Next: Tags** and add tags if desired. No tags are required for this demonstration.
171
171
14. Select Next: **Review + Create** and then select **Create**. The deployment process takes a few minutes.
@@ -179,7 +179,7 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
179
179
180
180
2. On a client device with [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) installed, connect to the public IP address of the Azure virtual machine.
181
181
182
-
<br><imgsrc="./media/how-to-tcp-tls-proxy/sql-connect.png"alt="A screenshot displaying the connection to a SQL server."width="60%">
182
+
<br><imgsrc="./media/how-to-tcp-tls-proxy/sql-connect.png"alt="Screenshot displaying the connection to a SQL server."width="60%">
Copy file name to clipboardExpand all lines: articles/application-gateway/monitor-application-gateway-reference.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,7 +126,7 @@ Application Gateway’s Layer 4 proxy provides log data through access logs. The
126
126
127
127
Application Gateway’s layer 4 proxy provides the capability to monitor the health of individual members of the backend pools through the portal and REST API.
128
128
129
-

129
+

130
130
131
131
### REST API
132
132
@@ -194,7 +194,7 @@ For reference, see a list of [all resource logs category types supported in Azur
194
194
> [!NOTE]
195
195
> The Performance log is available only for the v1 SKU. For the v2 SKU, use [Application Gateway v2 metrics](#application-gateway-v2-metrics) for performance data.
196
196
197
-
For more information, see [Backend health and diagnostic logs for Application Gateway](application-gateway-diagnostics.md#access-log)
197
+
For more information, see [Backend health and diagnostic logs for Application Gateway](application-gateway-diagnostics.md#access-log).
198
198
199
199
<!-- OPTION 2 - Link to the resource logs as above, but work in extra information not found in the automated metric-supported reference article. NOTE: YOU MUST MANUALLY MAINTAIN THIS SECTION to make sure it stays in sync with the resource-log-categories link. You can group these sections however you want provided you include the proper links back to resource-log-categories article.
Copy file name to clipboardExpand all lines: articles/application-gateway/multiple-site-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,9 @@ Using a wildcard character in the host name, you can match multiple host names i
50
50
>[!NOTE]
51
51
> This feature is available only for Standard_v2 and WAF_v2 SKU of Application Gateway.
52
52
53
-
In [Azure PowerShell](tutorial-multiple-sites-powershell.md), you must use `-HostNames` instead of `-HostName`. With HostNames, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `-HostNames "*.contoso.com","*.fabrikam.com"`
53
+
In [Azure PowerShell](tutorial-multiple-sites-powershell.md), you must use `-HostNames` instead of `-HostName`. With HostNames, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `-HostNames "*.contoso.com","*.fabrikam.com"`.
54
54
55
-
In [Azure CLI](tutorial-multiple-sites-cli.md), you must use `--host-names` instead of `--host-name`. With host-names, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `--host-names "*.contoso.com,*.fabrikam.com"`
55
+
In [Azure CLI](tutorial-multiple-sites-cli.md), you must use `--host-names` instead of `--host-name`. With host-names, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `--host-names "*.contoso.com,*.fabrikam.com"`.
56
56
57
57
In the Azure portal, under the multi-site listener, you must choose the **Multiple/Wildcard** host type to mention up to five host names with allowed wildcard characters.
0 commit comments