You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.yml
+17-17Lines changed: 17 additions & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ metadata:
6
6
author: greg-lindsay
7
7
ms.service: application-gateway
8
8
ms.topic: faq
9
-
ms.date: 02/24/2023
9
+
ms.date: 02/26/2023
10
10
ms.author: greglin
11
11
ms.custom: references_regions
12
12
title: Frequently asked questions about Application Gateway
@@ -59,15 +59,15 @@ sections:
59
59
60
60
- question: Where do I find the Application Gateway IP and DNS?
61
61
answer: |
62
-
If you're using a public IP address as an endpoint, you'll find the IP and DNS information on the public IP address resource. Or find it in the portal, on the overview page for the application gateway. If you're using internal IP addresses, find the information on the overview page.
62
+
If you're using a public IP address as an endpoint, you find the IP and DNS information on the public IP address resource. Or find it in the portal, on the overview page for the application gateway. If you're using internal IP addresses, find the information on the overview page.
63
63
64
64
For the v2 SKU, open the public IP resource and select **Configuration**. The **DNS name label (optional)** field is available to configure the DNS name.
65
65
66
66
- question: What are the settings for Keep-Alive timeout and TCP idle timeout?
67
67
answer: |
68
-
*Keep-Alive timeout* governs how long the Application Gateway will wait for a client to send another HTTP request on a persistent connection before reusing it or closing it. *TCP idle timeout* governs how long a TCP connection is kept open if there is no activity.
68
+
*Keep-Alive timeout* governs how long the Application Gateway waits for a client to send another HTTP request on a persistent connection before reusing it or closing it. *TCP idle timeout* governs how long a TCP connection is kept open if there is no activity.
69
69
70
-
The *Keep-Alive timeout* in the Application Gateway v1 SKU is 120 seconds and in the v2 SKU it's 75 seconds. The *TCP idle timeout* is a 4-minute default on the frontend virtual IP (VIP) of both v1 and v2 SKU of Application Gateway. You can configure the TCP idle timeout value on v1 and v2 Application Gateways to be anywhere between 4 minutes and 30 minutes. For both v1 and v2 Application Gateways, you'll need to navigate to the public IP of the Application Gateway and change the TCP idle timeout under the "Configuration" blade of the public IP on Portal. Changing the value of the private IP address isn't supported. You can set the TCP idle timeout value of the public IP through PowerShell by running the following commands:
70
+
The *Keep-Alive timeout* in the Application Gateway v1 SKU is 120 seconds and in the v2 SKU it's 75 seconds. The *TCP idle timeout* is a 4-minute default on the frontend virtual IP (VIP) of both v1 and v2 SKU of Application Gateway. You can configure the TCP idle timeout value on v1 and v2 Application Gateways to be anywhere between 4 minutes and 30 minutes. For both v1 and v2 Application Gateways, you need to navigate to the public IP of the Application Gateway and change the TCP idle timeout under the "Configuration" blade of the public IP on Portal. Changing the value of the private IP address isn't supported. You can set the TCP idle timeout value of the public IP through PowerShell by running the following commands:
Yes. For details see, [Migrate Azure Application Gateway and Web Application Firewall from v1 to v2](migrate-v1-v2.md).
131
131
132
-
- question: Will the Application Gateway v1 SKU continue to be supported?
132
+
- question: Is Application Gateway v1 SKU supported?
133
133
answer: |
134
-
Yes. The Application Gateway v1 SKU will continue to be supported. However, it is strongly recommended to move to v2 to take advantage of the feature updates in that SKU. For more information on the differences between v1 and v2 features, see [Autoscaling and Zone-redundant Application Gateway v2](application-gateway-autoscaling-zone-redundant.md). You can manually migrate Application Gateway v1 sku deployments to v2 by following our [v1-v2 migration document](migrate-v1-v2.md).
134
+
Yes. The Application Gateway v1 SKU continues to be supported. However, it is strongly recommended to move to v2 to take advantage of the feature updates in that SKU. For more information on the differences between v1 and v2 features, see [Autoscaling and Zone-redundant Application Gateway v2](application-gateway-autoscaling-zone-redundant.md). You can manually migrate Application Gateway v1 sku deployments to v2 by following our [v1-v2 migration document](migrate-v1-v2.md).
135
135
136
136
- question: Does Application Gateway V2 support proxying requests with NTLM authentication?
137
137
answer: No. Application Gateway V2 doesn't support proxying requests with NTLM authentication.
138
138
139
139
- question: Why are some header values not present when requests are forwarded to my application?
140
-
answer: Request header names can contain alphanumeric characters and hyphens. Request header names containing other characters will be discarded when a request is sent to the backend target. Response header names can contain any alphanumeric characters and specific symbols as defined in [RFC 7230](https://tools.ietf.org/html/rfc7230#page-27), with the exception of underscores (\_).
140
+
answer: Request header names can contain alphanumeric characters and hyphens. Request header names containing other characters will be discarded when a request is sent to the backend target. Response header names can contain any alphanumeric characters and specific symbols as defined in [RFC 7230](https://tools.ietf.org/html/rfc7230#page-27), except for underscores (\_).
141
141
142
142
- question: Does Application Gateway affinity cookie support SameSite attribute?
143
143
answer: |
@@ -192,7 +192,7 @@ sections:
192
192
193
193
- question: Can I change the virtual network or subnet for an existing Application Gateway?
194
194
answer: |
195
-
You can move an Application Gateway across subnets within the same virtual network only. It is supported with V1 with public and private frontend, and V2 with public frontend only. It is also important to note that the Application Gateway should be in a *Stopped* state to perform this action. Keep in mind that stopping/starting V1 will change the public IP. This operation can only be done using Azure PowerShell and Azure CLI by running the following commands:
195
+
You can move an Application Gateway across subnets within the same virtual network only. It is supported with V1 with public and private frontend, and V2 with public frontend only. It is also important to note that the Application Gateway should be in a *Stopped* state to perform this action. Keep in mind that stopping/starting V1 changes the public IP. This operation can only be done using Azure PowerShell and Azure CLI by running the following commands:
196
196
197
197
**Azure PowerShell**
198
198
@@ -225,7 +225,7 @@ sections:
225
225
226
226
- question: Are service endpoint policies supported in the Application Gateway subnet?
227
227
answer: |
228
-
No. [Service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) for storage accounts aren't supported in Application Gateway subnet and configuring it will block Azure infrastructure traffic.
228
+
No. [Service endpoint policies](../virtual-network/virtual-network-service-endpoint-policies-overview.md) for storage accounts aren't supported in Application Gateway subnet and configuring it blocks Azure infrastructure traffic.
229
229
230
230
- question: What are the limits on Application Gateway? Can I increase these limits?
231
231
answer: |
@@ -286,7 +286,7 @@ sections:
286
286
287
287
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address isn't blocked
288
288
289
-
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
289
+
e. Outbound internet connectivity can't be blocked. Otherwise, you face issues with logging, metrics, etc.
290
290
291
291
Sample NSG configuration for private IP only access:
292
292

@@ -413,7 +413,7 @@ sections:
413
413
414
414
For Application Gateway specific information, see below -
415
415
416
-
If you're using a certificate issued by one of the revoked ICAs, your application’s availability might be interrupted and depending on your application, you may receive a variety of error messages including but not limited to:
416
+
If you're using a certificate issued by one of the revoked ICAs, your application’s availability might be interrupted and depending on your application, you may receive various error messages including but not limited to:
417
417
418
418
1. Invalid certificate/revoked certificate
419
419
2. Connection timed out
@@ -423,7 +423,7 @@ sections:
423
423
424
424
1. Contact your certificate provider on how to reissue your certificates.
425
425
2. Once reissued, update your certificates on the Azure Application Gateway/WAF with the complete [chain of trust](/windows/win32/seccrypto/certificate-chains) (leaf, intermediate, root certificate). Based on where you're using your certificate, either on the listener or the HTTP settings of the Application Gateway, follow the steps below to update the certificates and check the documentation links mentioned for more information.
426
-
3. Update your backend application servers to use the reissued certificate. Depending on the backend server that you're using, your certificate update steps may vary. Please check for the documentation from your vendor.
426
+
3. Update your backend application servers to use the reissued certificate. Depending on the backend server that you're using, your certificate update steps may vary. Check for the documentation from your vendor.
427
427
428
428
To update the certificate in your listener:
429
429
@@ -468,21 +468,21 @@ sections:
468
468
469
469
- question: Why is my AKS cluster with kubenet not working with AGIC?
470
470
answer: |
471
-
AGIC tries to automatically associate the route table resource to the Application Gateway subnet but may fail to do so due to lack of permissions from the AGIC. If AGIC is unable to associate the route table to the Application Gateway subnet, there will be an error in the AGIC logs saying so, in which case you'll have to manually associate the route table created by the AKS cluster to the Application Gateway's subnet. For more information, see [Supported user-defined routes](configuration-infrastructure.md#supported-user-defined-routes).
471
+
AGIC tries to automatically associate the route table resource to the Application Gateway subnet but may fail to do so due to lack of permissions from the AGIC. If AGIC is unable to associate the route table to the Application Gateway subnet, there will be an error in the AGIC logs saying so, in which case you have to manually associate the route table created by the AKS cluster to the Application Gateway's subnet. For more information, see [Supported user-defined routes](configuration-infrastructure.md#supported-user-defined-routes).
472
472
473
473
- question: Can I connect my AKS cluster and Application Gateway in separate virtual networks?
474
474
answer: Yes, as long as the virtual networks are peered and they don't have overlapping address spaces. If you're running AKS with kubenet, then be sure to associate the route table generated by AKS to the Application Gateway subnet.
475
475
476
476
- question: What features aren't supported on the AGIC add-on?
477
477
answer: |
478
-
Please see the differences between AGIC deployed through Helm versus deployed as an AKS add-on [here](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on)
478
+
See the differences between AGIC deployed through Helm versus deployed as an AKS add-on [here](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on)
479
479
480
480
- question: When should I use the add-on versus the Helm deployment?
481
481
answer: |
482
-
Please see the differences between AGIC deployed through Helm versus deployed as an AKS add-on [here](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on), especially the tables documenting which scenario(s) are supported by AGIC deployed through Helm as opposed to an AKS add-on. In general, deploying through Helm will allow you to test out beta features and release candidates before an official release.
482
+
Please see the differences between AGIC deployed through Helm versus deployed as an AKS add-on [here](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on), especially the tables documenting which scenario(s) are supported by AGIC deployed through Helm as opposed to an AKS add-on. In general, deploying through Helm allows you to test out beta features and release candidates before an official release.
483
483
484
484
- question: Can I control which version of AGIC will be deployed with the add-on?
485
-
answer: No, AGIC add-on is a managed service which means Microsoft will automatically update the add-on to the latest stable version.
485
+
answer: No, AGIC add-on is a managed service, which means Microsoft will automatically update the add-on to the latest stable version.
486
486
487
487
- name: Configuration - mutual authentication
488
488
questions:
@@ -533,7 +533,7 @@ sections:
533
533
Usually, you see an unknown status when access to the backend is blocked by a network security group (NSG), custom DNS, or user-defined routing (UDR) on the application gateway subnet. For more information, see [Backend health, diagnostics logging, and metrics for Application Gateway](application-gateway-diagnostics.md).
534
534
535
535
- question: Are NSG flow logs supported on NSGs associated to Application Gateway v2 subnet?
536
-
answer: Due to current platform limitations, if you have an NSG on the Application Gateway v2 (Standard_v2, WAF_v2) subnet and if you have enabled NSG flow logs on it, you will see nondeterministic behavior and this scenario is currently not supported.
536
+
answer: Due to current platform limitations, if you have an NSG on the Application Gateway v2 (Standard_v2, WAF_v2) subnet and if you have enabled NSG flow logs on it, you see nondeterministic behavior and this scenario is currently not supported.
537
537
538
538
- question: Where does Application Gateway store customer data?
539
539
answer: Application Gateway doesn't move or store customer data out of the region it's deployed in.
0 commit comments