Skip to content

Commit 94143b6

Browse files
authored
Abbr updates
1 parent 0f93c8d commit 94143b6

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/application-gateway/http-response-codes.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ HTTP 307 responses are presented when a redirection rule is specified with the *
3838

3939
400-499 response codes indicate an issue that is initiated from the client. These issues can range from the client initiating requests to an unmatched hostname, request timeout, unauthenticated request, malicious request, and more.
4040

41-
Application Gateway collects metrics that capture the distribution of 4xx/5xx status codes has a logging mechanism that captures information such as the URI client IP address with the response code. Metrics and logging enable further troubleshooting. Clients can also receive 4xx response from other proxies between the client device and Application Gateway. For example, CDN and other authentication providers. See the following articles for more information.
41+
Application Gateway collects metrics that capture the distribution of 4xx/5xx status codes has a logging mechanism that captures information such as the URI client IP address with the response code. Metrics and logging enable further troubleshooting. Clients can also receive 4xx response from other proxies between the client device and Application Gateway. For example, CDN (Content Delivery Network) and other authentication providers. See the following articles for more information.
4242

4343
[Metrics supported by Application Gateway V2 SKU](application-gateway-metrics.md#metrics-supported-by-application-gateway-v2-sku)
4444
[Diagnostic logs](application-gateway-diagnostics.md#diagnostic-logging)
@@ -66,13 +66,13 @@ Some common reasons for the request to be non-compliant to RFC are:
6666
| Invalid value in Content-Length | Content-Length: **abc**,Content-Length: **-10**|
6767

6868
For cases when mutual authentication is configured, several scenarios can lead to an HTTP 400 response being returned the client, such as:
69-
- Client certificate isn't presented, but mutual authentication is enabled.
70-
- DN validation is enabled and the DN of the client certificate doesn't match the DN of the specified certificate chain.
69+
- Mutual authentication is enabled but the Client certificate wasn't presented.
70+
- DN (Distinguished Name) validation is enabled and the DN of the client certificate doesn't match the DN of the specified certificate chain.
7171
- Client certificate chain doesn't match certificate chain configured in the defined SSL Policy.
7272
- Client certificate is expired.
73-
- OCSP Client Revocation check is enabled and the certificate is revoked.
74-
- OCSP Client Revocation check is enabled, but unable to be contacted.
75-
- OCSP Client Revocation check is enabled, but OCSP responder isn't provided in the certificate.
73+
- OCSP (Online Certificate Status Protocol) Client Revocation check is enabled and the certificate is revoked.
74+
- OCSP (Online Certificate Status Protocol) Client Revocation check is enabled, but unable to be contacted.
75+
- OCSP (Online Certificate Status Protocol) Client Revocation check is enabled, but OCSP responder isn't provided in the certificate.
7676

7777
For more information about troubleshooting mutual authentication, see [Error code troubleshooting](mutual-authentication-troubleshooting.md#solution-2).
7878

@@ -89,7 +89,7 @@ An HTTP 401 unauthorized response can be returned to AppGW probe request if the
8989

9090
#### 403 – Forbidden
9191

92-
HTTP 403 Forbidden is presented when customers are utilizing WAF skus and have WAF configured in Prevention mode. If enabled WAF rulesets or custom deny WAF rules match the characteristics of an inbound request, the client is presented a 403 forbidden response.
92+
HTTP 403 Forbidden is presented when customers are utilizing WAF (Web Application Firewall) skus and have WAF configured in Prevention mode. If enabled WAF rulesets or custom deny WAF rules match the characteristics of an inbound request, the client is presented a 403 forbidden response.
9393

9494
Other reasons for clients receiving 403 responses include:
9595
- You're using App Service as backend and it's configured to allow access only from Application Gateway. This can return a 403 error by App Services. This typically happens due to redirects/href links that point directly to App Services instead of pointing at the Application Gateway's IP address.
@@ -126,7 +126,7 @@ Azure Application Gateway shouldn't exhibit 500 response codes. Open a support r
126126
#### 502 – Bad Gateway
127127

128128
HTTP 502 errors can have several root causes, for example:
129-
- NSG, UDR, or custom DNS is blocking access to backend pool members.
129+
- NSG (Network security group), UDR (user-defined route), or custom DNS is blocking access to backend pool members.
130130
- Backend VMs or instances of [virtual machine scale sets](/azure/virtual-machine-scale-sets/overview) aren't responding to the default health probe.
131131
- Invalid or improper configuration of custom health probes.
132132
- Azure Application Gateway's [backend pool isn't configured or empty](application-gateway-troubleshooting-502.md#empty-backendaddresspool).
@@ -139,11 +139,11 @@ For information about scenarios where 502 errors occur, and how to troubleshoot
139139

140140
Azure application Gateway V2 SKU sent HTTP 504 errors if the backend response time exceeds the time-out value that is configured in the Backend Setting.
141141

142-
IIS
142+
IIS (Internet Information Services web server)
143143

144144
If your backend server is IIS, see [Default Limits for Web Sites](/iis/configuration/system.applicationhost/sites/sitedefaults/limits#configuration) to set the timeout value. Refer to the `connectionTimeout` attribute for details. Ensure the connection timeout in IIS matches or does not exceed the timeout set in the backend setting.
145145

146-
nginx
146+
Nginx
147147

148148
If the backend server is nginx or nginx ingress controller, and if it has upstream servers, ensure the value of `nginx:proxy_read_timeout` matches or does not exceed with the timeout set in the backend setting.
149149

0 commit comments

Comments
 (0)