Skip to content

Commit fcc6932

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into privlink-patch
2 parents 7066a35 + 25fd0b1 commit fcc6932

22 files changed

+720
-162
lines changed

articles/app-service/deploy-azure-pipelines.md

Lines changed: 487 additions & 0 deletions
Large diffs are not rendered by default.
30.3 KB
Loading

articles/app-service/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -295,6 +295,8 @@
295295
href: deploy-ci-cd-custom-container.md
296296
- name: Deploy from local Git
297297
href: deploy-local-git.md
298+
- name: Azure Pipelines
299+
href: deploy-azure-pipelines.md
298300
- name: GitHub Actions
299301
href: deploy-github-actions.md
300302
- name: GitHub Actions for Containers

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: troubleshooting
8-
ms.date: 07/20/2022
8+
ms.date: 09/13/2022
99
ms.author: greglin
1010
ms.custom: devx-track-azurepowershell
1111
---

articles/application-gateway/application-gateway-faq.yml

Lines changed: 24 additions & 23 deletions
Large diffs are not rendered by default.

articles/application-gateway/application-gateway-ilb-arm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: how-to
8-
ms.date: 01/11/2022
8+
ms.date: 09/13/2022
99
ms.author: greglin
1010
ms.custom: devx-track-azurepowershell
1111
---
@@ -35,7 +35,7 @@ This article walks you through the steps to configure a Standard v1 Application
3535
## Create an application gateway
3636

3737
The difference between using Azure Classic and Azure Resource Manager is the order in which you create the application gateway and the items that need to be configured.
38-
With Resource Manager, all items that make an application gateway is configured individually and then put together to create the application gateway resource.
38+
With Resource Manager, all items that make an application gateway are configured individually and then put together to create the application gateway resource.
3939

4040
Here are the steps that are needed to create an application gateway:
4141

articles/application-gateway/application-gateway-troubleshooting-502.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: troubleshooting
8-
ms.date: 11/16/2019
9-
ms.author: amsriva
8+
ms.date: 09/13/2022
9+
ms.author: greglin
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

@@ -18,7 +18,7 @@ Learn how to troubleshoot bad gateway (502) errors received when using Azure App
1818

1919
## Overview
2020

21-
After configuring an application gateway, one of the errors that you may see is "Server Error: 502 - Web server received an invalid response while acting as a gateway or proxy server". This error may happen for the following main reasons:
21+
After you configure an application gateway, one of the errors that you may see is **Server Error: 502 - Web server received an invalid response while acting as a gateway or proxy server**. This error may happen for the following main reasons:
2222

2323
* NSG, UDR, or Custom DNS is blocking access to backend pool members.
2424
* Back-end VMs or instances of virtual machine scale set aren't responding to the default health probe.
@@ -31,42 +31,42 @@ After configuring an application gateway, one of the errors that you may see is
3131

3232
### Cause
3333

34-
If access to the backend is blocked because of an NSG, UDR, or custom DNS, application gateway instances can't reach the backend pool. This causes probe failures, resulting in 502 errors.
34+
If access to the backend is blocked because of an NSG, UDR, or custom DNS, application gateway instances can't reach the backend pool. This issue causes probe failures, resulting in 502 errors.
3535

3636
The NSG/UDR could be present either in the application gateway subnet or the subnet where the application VMs are deployed.
3737

38-
Similarly, the presence of a custom DNS in the VNet could also cause issues. A FQDN used for backend pool members might not resolve correctly by the user configured DNS server for the VNet.
38+
Similarly, the presence of a custom DNS in the VNet could also cause issues. An FQDN used for backend pool members might not resolve correctly by the user configured DNS server for the VNet.
3939

4040
### Solution
4141

4242
Validate NSG, UDR, and DNS configuration by going through the following steps:
4343

44-
* Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked.
45-
* Check UDR associated with the application gateway subnet. Ensure that the UDR isn't directing traffic away from the backend subnet. For example, check for routing to network virtual appliances or default routes being advertised to the application gateway subnet via ExpressRoute/VPN.
44+
1. Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked.
45+
2. Check UDR associated with the application gateway subnet. Ensure that the UDR isn't directing traffic away from the backend subnet. For example, check for routing to network virtual appliances or default routes being advertised to the application gateway subnet via ExpressRoute/VPN.
4646

47-
```azurepowershell
48-
$vnet = Get-AzVirtualNetwork -Name vnetName -ResourceGroupName rgName
49-
Get-AzVirtualNetworkSubnetConfig -Name appGwSubnet -VirtualNetwork $vnet
50-
```
47+
```azurepowershell
48+
$vnet = Get-AzVirtualNetwork -Name vnetName -ResourceGroupName rgName
49+
Get-AzVirtualNetworkSubnetConfig -Name appGwSubnet -VirtualNetwork $vnet
50+
```
5151
52-
* Check effective NSG and route with the backend VM
52+
3. Check effective NSG and route with the backend VM
5353
54-
```azurepowershell
55-
Get-AzEffectiveNetworkSecurityGroup -NetworkInterfaceName nic1 -ResourceGroupName testrg
56-
Get-AzEffectiveRouteTable -NetworkInterfaceName nic1 -ResourceGroupName testrg
57-
```
54+
```azurepowershell
55+
Get-AzEffectiveNetworkSecurityGroup -NetworkInterfaceName nic1 -ResourceGroupName testrg
56+
Get-AzEffectiveRouteTable -NetworkInterfaceName nic1 -ResourceGroupName testrg
57+
```
5858
59-
* Check presence of custom DNS in the VNet. DNS can be checked by looking at details of the VNet properties in the output.
59+
4. Check presence of custom DNS in the VNet. DNS can be checked by looking at details of the VNet properties in the output.
6060
61-
```json
62-
Get-AzVirtualNetwork -Name vnetName -ResourceGroupName rgName
63-
DhcpOptions : {
64-
"DnsServers": [
65-
"x.x.x.x"
66-
]
67-
}
68-
```
69-
If present, ensure that the DNS server can resolve the backend pool member's FQDN correctly.
61+
```json
62+
Get-AzVirtualNetwork -Name vnetName -ResourceGroupName rgName
63+
DhcpOptions : {
64+
"DnsServers": [
65+
"x.x.x.x"
66+
]
67+
}
68+
```
69+
5. If present, ensure that the DNS server can resolve the backend pool member's FQDN correctly.
7070
7171
## Problems with default health probe
7272
@@ -91,9 +91,9 @@ The following table lists the values associated with the default health probe:
9191
* Protocol of the request is determined by the BackendHttpSetting protocol.
9292
* URI Path will be set to */*.
9393
* If BackendHttpSetting specifies a port other than 80, the default site should be configured to listen at that port.
94-
* The call to `protocol://127.0.0.1:port` should return an HTTP result code of 200. This should be returned within the 30-second timeout period.
94+
* The call to `protocol://127.0.0.1:port` should return an HTTP result code of 200. This code should be returned within the 30-second timeout period.
9595
* Ensure the configured port is open and there are no firewall rules or Azure Network Security Groups blocking incoming or outgoing traffic on the port configured.
96-
* If Azure classic VMs or Cloud Service is used with a FQDN or a public IP, ensure that the corresponding [endpoint](/previous-versions/azure/virtual-machines/windows/classic/setup-endpoints?toc=%2fazure%2fapplication-gateway%2ftoc.json) is opened.
96+
* If Azure classic VMs or Cloud Service is used with an FQDN or a public IP, ensure that the corresponding [endpoint](/previous-versions/azure/virtual-machines/windows/classic/setup-endpoints?toc=%2fazure%2fapplication-gateway%2ftoc.json) is opened.
9797
* If the VM is configured via Azure Resource Manager and is outside the VNet where the application gateway is deployed, a [Network Security Group](../virtual-network/network-security-groups-overview.md) must be configured to allow access on the desired port.
9898
9999
## Problems with custom health probe
@@ -128,7 +128,7 @@ Validate that the Custom Health Probe is configured correctly as the preceding t
128128
129129
### Cause
130130
131-
When a user request is received, the application gateway applies the configured rules to the request and routes it to a back-end pool instance. It waits for a configurable interval of time for a response from the back-end instance. By default, this interval is **20** seconds. In Application Gateway v1, if the application gateway does not receive a response from back-end application in this interval, the user request gets a 502 error. In Application Gateway v2, if the application gateway does not receive a response from the back-end application in this interval, the request will be tried against a second back-end pool member. If the second request fails the user request gets a 502 error.
131+
When a user request is received, the application gateway applies the configured rules to the request and routes it to a back-end pool instance. It waits for a configurable interval of time for a response from the back-end instance. By default, this interval is **20** seconds. In Application Gateway v1, if the application gateway doesn't receive a response from back-end application in this interval, the user request gets a 502 error. In Application Gateway v2, if the application gateway doesn't receive a response from the back-end application in this interval, the request will be tried against a second back-end pool member. If the second request fails the user request gets a 502 error.
132132
133133
### Solution
134134
@@ -152,7 +152,7 @@ Ensure that the back-end address pool isn't empty. This can be done either via P
152152
Get-AzApplicationGateway -Name "SampleGateway" -ResourceGroupName "ExampleResourceGroup"
153153
```
154154

155-
The output from the preceding cmdlet should contain non-empty back-end address pool. The following example shows two pools returned which are configured with a FQDN or an IP addresses for the backend VMs. The provisioning state of the BackendAddressPool must be 'Succeeded'.
155+
The output from the preceding cmdlet should contain non-empty back-end address pool. The following example shows two pools returned which are configured with an FQDN or an IP addresses for the backend VMs. The provisioning state of the BackendAddressPool must be 'Succeeded'.
156156

157157
BackendAddressPoolsText:
158158

articles/application-gateway/configuration-http-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 02/17/2022
8+
ms.date: 09/13/2022
99
ms.author: greglin
1010
---
1111

articles/application-gateway/configuration-infrastructure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 06/14/2021
9-
ms.author: surmb
8+
ms.date: 09/13/2022
9+
ms.author: greglin
1010
---
1111

1212
# Application Gateway infrastructure configuration
@@ -32,7 +32,7 @@ Application Gateway (Standard or WAF) SKU can support up to 32 instances (32 ins
3232

3333
Application Gateway (Standard_v2 or WAF_v2 SKU) can support up to 125 instances (125 instance IP addresses + 1 private frontend IP configuration + 5 Azure reserved). A minimum subnet size of /24 is recommended.
3434

35-
To determine the available capacity of a subnet that has existing Application Gateways provisioned, take the size of the subnet and subtract the five reserved IP addresses of the subnet reserved by the platform.  Next, take each gateway and subtract the the max-instance count.  For each gateway that has a private frontend IP configuration, subtract one additional IP address per gateway as well.
35+
To determine the available capacity of a subnet that has existing Application Gateways provisioned, take the size of the subnet and subtract the five reserved IP addresses of the subnet reserved by the platform.  Next, take each gateway and subtract the max-instance count.  For each gateway that has a private frontend IP configuration, subtract one additional IP address per gateway as well.
3636

3737
For example, here's how to calculate the available addressing for a subnet with three gateways of varying sizes:
3838
- Gateway 1: Maximum of 10 instances; utilizes a private frontend IP configuration
@@ -46,7 +46,7 @@ Subnet Size /24 = 255 IP addresses - 5 reserved from the platform = 250 availabl
4646
237 - Gateway 3 (15) - 1 private frontend IP configuration = 221
4747

4848
> [!IMPORTANT]
49-
> Although a /24 subnet is not required per Application Gateway v2 SKU deployment, it is highly recommended. This is to ensure that Application Gateway v2 has sufficient space for autoscaling expansion and maintenance upgrades. You should ensure that the Application Gateway v2 subnet has sufficient address space to accommodate the number of instances required to serve your maximum expected traffic. If you specify the maximum instance count, then the subnet should have capacity for at least that many addresses. For capacity planning around instance count, see [instance count details](understanding-pricing.md#instance-count).
49+
> Although a /24 subnet isn't required per Application Gateway v2 SKU deployment, it is highly recommended. This is to ensure that Application Gateway v2 has sufficient space for autoscaling expansion and maintenance upgrades. You should ensure that the Application Gateway v2 subnet has sufficient address space to accommodate the number of instances required to serve your maximum expected traffic. If you specify the maximum instance count, then the subnet should have capacity for at least that many addresses. For capacity planning around instance count, see [instance count details](understanding-pricing.md#instance-count).
5050
5151
> [!TIP]
5252
> IP addresses are allocated from the beginning of the defined subnet space for gateway instances. As instances are created and removed due to creation of gateways or scaling events, it can become difficult to understand what the next available address is in the subnet. To be able to determine the next address to use for a future gateway and have a contiguous addressing theme for frontend IPs, consider assigning frontend IP addresses from the upper half of the defined subset space. For example, if my subnet address space is 10.5.5.0/24, consider setting the private frontend IP configuration of your gateways starting with 10.5.5.254 and then following with 10.5.5.253, 10.5.5.252, 10.5.5.251, and so forth for future gateways.

articles/application-gateway/features.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 01/18/2022
8+
ms.date: 09/13/2022
99
ms.author: greglin
1010
---
1111

@@ -151,3 +151,4 @@ For an Application Gateway v1-v2 feature comparison, see [What is Azure Applicat
151151
## Next steps
152152

153153
- Learn [how an application gateway works](how-application-gateway-works.md)
154+
- Review [Frequently asked questions about Azure Application Gateway](application-gateway-faq.yml)

0 commit comments

Comments
 (0)