You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-probe-overview.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: article
8
-
ms.date: 07/29/2023
8
+
ms.date: 09/14/2023
9
9
ms.author: greglin
10
10
ms.custom: devx-track-azurepowershell
11
11
---
@@ -24,7 +24,7 @@ The source IP address of the probes depends on the backend server type:
24
24
- If the server in the backend pool is a private endpoint, the source IP address will be from your application gateway subnet's address space.
25
25
26
26
### Probe operations
27
-
The gateway starts firing probes as soon as you configure a Rule associating the Backend Setting and Backend Pool (and the Listener, of course). The illustration shows that the gateway independently probes the backend pool servers. And the incoming requests are sent only to the healthy servers as they start arriving. By default, the first probe is assumed Healthy to begin serving the requests immediately.
27
+
A gateway starts firing probes immediately after you configure a Rule by associating it with a Backend Setting and Backend Pool (and the Listener, of course). The illustration shows that the gateway independently probes all the backend pool servers. The incoming requests that start arriving are sent only to the healthy servers. A backend server is marked as unhealthy by default until a successful probe response is received.
28
28
29
29
:::image type="content" source="media/application-gateway-probe-overview/appgatewayprobe.png" alt-text="Diagram showing Application Gateway initiating health probes to individual backend targets within a backend pool":::
30
30
@@ -35,9 +35,9 @@ The required probes are determined based on the unique combination of the Backen
35
35
Moreover, all instances of the application gateway probe the backend servers independently of each other.
36
36
37
37
### Probe intervals
38
-
The same probe configuration applies to each instance. For example, if the application gateway has two instances and the probe interval is set to 20 seconds, both instances will send the health probe every 20 seconds.
38
+
The same probe configuration applies to each instance of your Application Gateway. For example, if an application gateway has two instances and the probe interval is set to 20 seconds, both instances will send the health probe every 20 seconds.
39
39
40
-
A probe marks a server as unhealthy only after the consecutive failure count matches the "Unhealthy threshold" limit. Accordingly, if you set this limit as 2 and a backend server stops functioning, the application gateway probes will mark it as unhealthy only after 2 x 20 seconds.
40
+
Once the probe detects a failed response, the counter for "Unhealthy threshold" sets off and marks the server as unhealthy if the consecutive failed count matches the configured threshold. Accordingly, if you set this Unhealthy Threshold as 2, the subsequent probe will first detect this failure. The application gateway will then mark the server as unhealthy after 2 consecutive failed probes [First detection 20 secs + (2 consecutive failed probes * 20 secs)].
41
41
42
42
> [!NOTE]
43
43
> The Backend health report is updated based on the respective probe's refresh interval and doesn't depend on the user's request.
Once the match criteria is specified, it can be attached to probe configuration using a `-Match` parameter in PowerShell.
101
101
102
-
### Some use cases for custom probes
103
-
-When the backend server allows access to only authenticated users, the application gateway probes will receive a 401 response code instead of 200. As the users are bound to authenticate themselves for the live traffic, you need configure the probe traffic to accept 401 as an expected response.
104
-
- When the backend server has a wildcard certificate (*.contoso.com) installed to serve different sub-domains and is fronted by an application gateway. In this case, you can use a Custom probe with a specific hostname (required for SNI) that is acceptable to establish a successful TLS probe and report that server as healthy. With "override hostname" in the backend setting set to NO, the different incoming hostnames (subdomains) will be passed as is to the backend.
102
+
### Some use cases for Custom probes
103
+
-If a backend server allows access to only authenticated users, the application gateway probes will receive a 403 response code instead of 200. As the clients (users) are bound to authenticate themselves for the live traffic, you can configure the probe traffic to accept 403 as an expected response.
104
+
- When a backend server has a wildcard certificate (*.contoso.com) installed to serve different sub-domains, you can use a Custom probe with a specific hostname (required for SNI) that is accepted to establish a successful TLS probe and report that server as healthy. With "override hostname" in the Backend Setting set to NO, the different incoming hostnames (subdomains) will be passed as is to the backend.
0 commit comments