You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-backend-health-troubleshooting.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,7 +215,7 @@ To create a custom probe, follow [these steps](./application-gateway-create-prob
215
215
### HTTP response body mismatch
216
216
217
217
**Message:** Body of the backend's HTTP response did not match the
218
-
probe setting. Received response body does not contain {string}.
218
+
probe setting. Received response body doesn't contain {string}.
219
219
220
220
**Cause:** When you create a custom probe, you can mark a backend server as Healthy by matching a string from the response body. For example, you can configure Application Gateway to accept "unauthorized" as a string to match. If the backend server response for the probe request contains the string **unauthorized**, it will be marked as Healthy. Otherwise, it will be marked as Unhealthy with this message.
221
221
@@ -255,7 +255,7 @@ For more information about how to extract and upload Trusted Root Certificates i
255
255
256
256
### Trusted root certificate mismatch
257
257
258
-
**Message:** The root certificate of the server certificate used by the backend does not match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to whitelist the backend.
258
+
**Message:** The root certificate of the server certificate used by the backend doesn't match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to whitelist the backend.
259
259
260
260
**Cause:** End-to-end SSL with Application Gateway v2 requires the backend server's certificate to be verified in order to deem the server Healthy. For a TLS/SSL certificate to be trusted, the backend server certificate must be issued by a CA that's included in the trusted store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
261
261
@@ -297,7 +297,7 @@ If the output doesn't show the complete chain of the certificate being returned,
297
297
298
298
### Backend certificate invalid common name (CN)
299
299
300
-
**Message:** The Common Name (CN) of the backend certificate does not match the host header of the probe.
300
+
**Message:** The Common Name (CN) of the backend certificate doesn't match the host header of the probe.
301
301
302
302
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s TLS/SSL certificate. This verification is Standard_v2 and WAF_v2 SKU (V2) behavior. The Standard and WAF SKU (v1) Server Name Indication (SNI) is set as the FQDN in the backend pool address. For more information on SNI behavior and differences between v1 and v2 SKU, see [Overview of TLS termination and end to end TLS with Application Gateway](ssl-overview.md).
303
303
@@ -389,7 +389,7 @@ This behavior can occur for one or more of the following reasons:
389
389
390
390
3. Default route advertised by the ExpressRoute/VPN connection to the virtual network over BGP:
391
391
392
-
a. If you have an ExpressRoute/VPN connection to the virtual network over BGP, and if you are advertising a default route, you must make sure that the packet is routed back to the internet destination without modifying it. You can verify by using the **Connection Troubleshoot** option in the Application Gateway portal.
392
+
a. If you have an ExpressRoute/VPN connection to the virtual network over BGP, and if you're advertising a default route, you must make sure that the packet is routed back to the internet destination without modifying it. You can verify by using the **Connection Troubleshoot** option in the Application Gateway portal.
393
393
b. Choose the destination manually as any internet-routable IP address like 1.1.1.1. Set the destination port as anything, and verify the connectivity.
394
394
c. If the next hop is virtual network gateway, there might be a default route advertised over ExpressRoute or VPN.
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-components.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,11 @@
2
2
title: Application gateway components
3
3
description: This article provides information about the various components in an application gateway
4
4
services: application-gateway
5
-
author: surajmb
5
+
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: conceptual
8
8
ms.date: 08/21/2020
9
-
ms.author: surmb
9
+
ms.author: greglin
10
10
---
11
11
12
12
# Application gateway components
@@ -23,7 +23,7 @@ A frontend IP address is the IP address associated with an application gateway.
23
23
24
24
The Azure Application Gateway V2 SKU can be configured to support either both static internal IP address and static public IP address, or only static public IP address. It cannot be configured to support only static internal IP address.
25
25
26
-
The V1 SKU can be configured to support static or dynamic internal IP address and dynamic public IP address. The dynamic IP address of Application Gateway does not change on a running gateway. It can change only when you stop or start the Gateway. It does not change on system failures, updates, Azure host updates etc.
26
+
The V1 SKU can be configured to support static or dynamic internal IP address and dynamic public IP address. The dynamic IP address of Application Gateway doesn't change on a running gateway. It can change only when you stop or start the Gateway. It doesn't change on system failures, updates, Azure host updates etc.
27
27
28
28
The DNS name associated with an application gateway doesn't change over the lifecycle of the gateway. As a result, you should use a CNAME alias and point it to the DNS address of the application gateway.
29
29
@@ -79,7 +79,7 @@ After you create a listener, you associate it with a request routing rule. This
79
79
80
80
## Request routing rules
81
81
82
-
A request routing rule is a key component of an application gateway because it determines how to route traffic on the listener. The rule binds the listener, the back-end server pool, and the backend HTTP settings.
82
+
A request routing rule is a key component of an application gateway because it determines how to route traffic on the listener. The rule binds the listener, the backend server pool, and the backend HTTP settings.
83
83
84
84
When a listener accepts a request, the request routing rule forwards the request to the backend or redirects it elsewhere. If the request is forwarded to the backend, the request routing rule defines which backend server pool to forward it to. The request routing rule also determines if the headers in the request are to be rewritten. One listener can be attached to one rule.
85
85
@@ -144,7 +144,7 @@ You can create different backend pools for different types of requests. For exam
144
144
145
145
By default, an application gateway monitors the health of all resources in its backend pool and automatically removes unhealthy ones. It then monitors unhealthy instances and adds them back to the healthy backend pool when they become available and respond to health probes.
146
146
147
-
In addition to using default health probe monitoring, you can also customize the health probe to suit your application's requirements. Custom probes allow more granular control over the health monitoring. When using custom probes, you can configure a custom hostname, URL path, probe interval, and how many failed responses to accept before marking the back-end pool instance as unhealthy, custom status codes and response body match, etc. We recommend that you configure custom probes to monitor the health of each backend pool.
147
+
In addition to using default health probe monitoring, you can also customize the health probe to suit your application's requirements. Custom probes allow more granular control over the health monitoring. When using custom probes, you can configure a custom hostname, URL path, probe interval, and how many failed responses to accept before marking the backend pool instance as unhealthy, custom status codes and response body match, etc. We recommend that you configure custom probes to monitor the health of each backend pool.
148
148
149
149
For more information, see [Monitor the health of your application gateway](../application-gateway/application-gateway-probe-overview.md).
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,11 @@
2
2
title: Configure listener-specific SSL policies on Azure Application Gateway through portal
3
3
description: Learn how to configure listener-specific SSL policies on Application Gateway through portal
4
4
services: application-gateway
5
-
author: mscatyao
5
+
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: how-to
8
8
ms.date: 02/18/2022
9
-
ms.author: caya
9
+
ms.author: greglin
10
10
---
11
11
12
12
# Configure listener-specific SSL policies on Application Gateway through portal
@@ -32,7 +32,7 @@ Before you proceed, here are some important points related to listener-specific
32
32
- You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication or listener-specific SSL policy configured, or both configured in your SSL profile.
33
33
- Using a new Predefined or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old as well as new SSL (predefined or custom) policies.
34
34
35
-
Consider this example, you are currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
35
+
Consider this example, you're currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
36
36
37
37
To set up a listener-specific SSL policy, you'll need to first go to the **SSL settings** tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate(s) for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
38
38
@@ -75,7 +75,7 @@ Now that we've created an SSL profile with a listener-specific SSL policy, we ne
75
75

76
76
77
77
### Limitations
78
-
There is a limitation right now on Application Gateway where different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners will work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you will need to use distinct ports for each.
78
+
There is a limitation right now on Application Gateway that different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners will work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you will need to use distinct ports for each.
> - If you are using a custom SSL policy in Application Gateway v1 SKU (Standard or WAF), make sure that you add the mandatory cipher "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" to the list. This cipher is required to enable metrics and logging in the Application Gateway v1 SKU. This is not mandatory for Application Gateway v2 SKU (Standard_v2 or WAF_v2).
138
-
> - Cipher suites "TLS_AES_128_GCM_SHA256" and "TLS_AES_256_GCM_SHA384" with TLSv1.3 are not customizable and included by default when setting a CustomV2 policy with a minimum TLS version of 1.2 or 1.3. These two cipher suites will not appear in the Get Details output, with an exception of Portal.
137
+
> - If you're using a custom SSL policy in Application Gateway v1 SKU (Standard or WAF), make sure that you add the mandatory cipher "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" to the list. This cipher is required to enable metrics and logging in the Application Gateway v1 SKU. This is not mandatory for Application Gateway v2 SKU (Standard_v2 or WAF_v2).
138
+
> - Cipher suites "TLS_AES_128_GCM_SHA256" and "TLS_AES_256_GCM_SHA384" with TLSv1.3 are not customizable and included by default when setting a CustomV2 policy with a minimum TLS version of 1.2 or 1.3. These two cipher suites won't appear in the Get Details output, with an exception of Portal.
139
139
140
140
To set minimum protocol version to 1.3, you must use the following command:
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-create-probe-classic-ps.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ To create an application gateway:
33
33
34
34
### Create an application gateway resource with a custom probe
35
35
36
-
To create the gateway, use the `New-AzureApplicationGateway` cmdlet, replacing the values with your own. Billing for the gateway does not start at this point. Billing begins in a later step, when the gateway is successfully started.
36
+
To create the gateway, use the `New-AzureApplicationGateway` cmdlet, replacing the values with your own. Billing for the gateway doesn't start at this point. Billing begins in a later step, when the gateway is successfully started.
37
37
38
38
The following example creates an application gateway by using a virtual network called "testvnet1" and a subnet called "subnet-1".
39
39
@@ -126,7 +126,7 @@ Copy the following text to Notepad.
126
126
127
127
Edit the values between the parentheses for the configuration items. Save the file with extension .xml.
128
128
129
-
The following example shows how to use a configuration file to set up the application gateway to load balance HTTP traffic on public port 80 and send network traffic to back-end port 80 between two IP addresses by using a custom probe.
129
+
The following example shows how to use a configuration file to set up the application gateway to load balance HTTP traffic on public port 80 and send network traffic to backend port 80 between two IP addresses by using a custom probe.
130
130
131
131
> [!IMPORTANT]
132
132
> The protocol item Http or Https is case-sensitive.
@@ -142,9 +142,9 @@ The configuration parameters are:
142
142
|**Host** and **Path**| Complete URL path that is invoked by the application gateway to determine the health of the instance. For example, if you have a website http:\//contoso.com/, then the custom probe can be configured for "http:\//contoso.com/path/custompath.htm" for probe checks to have a successful HTTP response.|
143
143
|**Interval**| Configures the probe interval checks in seconds.|
144
144
|**Timeout**| Defines the probe time-out for an HTTP response check.|
145
-
|**UnhealthyThreshold**| The number of failed HTTP responses needed to flag the back-end instance as *unhealthy*.|
145
+
|**UnhealthyThreshold**| The number of failed HTTP responses needed to flag the backend instance as *unhealthy*.|
146
146
147
-
The probe name is referenced in the \<BackendHttpSettings\> configuration to assign which back-end pool uses custom probe settings.
147
+
The probe name is referenced in the \<BackendHttpSettings\> configuration to assign which backend pool uses custom probe settings.
148
148
149
149
## Add a custom probe to an existing application gateway
0 commit comments