We recommend that you use the Azure Az PowerShell module to interact with Azure. See Install Azure PowerShell to get started. To learn how to migrate to the Az PowerShell module, see Migrate Azure PowerShell from AzureRM to Az.
The following are common questions asked about Azure Application Gateway.
What is Application Gateway?
Azure Application Gateway provides an application delivery controller (ADC) as a service. It offers various layer 7 load-balancing capabilities for your applications. This service is highly available, scalable, and fully managed by Azure.
What features does Application Gateway support?
Application Gateway supports autoscaling, TLS offloading, and end-to-end TLS, a web application firewall (WAF), cookie-based session affinity, URL path-based routing, multisite hosting, and other features. For a full list of supported features, see Introduction to Application Gateway.
How do Application Gateway and Azure Load Balancer differ?
Application Gateway is a layer 7 load balancer, which means it works only with web traffic (HTTP, HTTPS, WebSocket, and HTTP/2). It supports capabilities such as TLS termination, cookie-based session affinity, and round robin for load-balancing traffic. Load Balancer load-balances traffic at layer 4 (TCP or UDP).
What protocols does Application Gateway support?
Application Gateway supports HTTP, HTTPS, HTTP/2, and WebSocket.
How does Application Gateway support HTTP/2?
See HTTP/2 support.
What resources are supported as part of a backend pool?
In what regions is Application Gateway available?
Application Gateway v1 (Standard and WAF) is available in all regions of global Azure. It's also available in Azure China 21Vianet and Azure Government.
For Application Gateway v2 (Standard_v2 and WAF_v2) availability, see supported regions for Application Gateway v2
Is this deployment dedicated for my subscription, or is it shared across customers?
Application Gateway is a dedicated deployment in your virtual network.
Does Application Gateway support HTTP-to-HTTPS redirection?
Redirection is supported. See Application Gateway redirect overview.
In what order are listeners processed?
See the order of listener processing.
Where do I find the Application Gateway IP and DNS?
If you're using a public IP address as an endpoint, you find the IP and DNS information on the public IP address resource. Or find it in the portal, on the overview page for the application gateway. If you're using internal IP addresses, find the information on the overview page.
For the v2 SKU, open the public IP resource and select Configuration. The DNS name label (optional) field is available to configure the DNS name.
What are the settings for Keep-Alive timeout and TCP idle timeout?
Keep-Alive timeout governs how long the Application Gateway waits for a client to send another HTTP request on a persistent connection before reusing it or closing it. TCP idle timeout governs how long a TCP connection is kept open if there's no activity.
The Keep-Alive timeout in the Application Gateway v1 SKU is 120 seconds and in the v2 SKU it's 75 seconds. The TCP idle timeout is a 4-minute default on the frontend virtual IP (VIP) of both v1 and v2 SKU of Application Gateway. You can configure the TCP idle timeout value on v1 and v2 Application Gateways to be anywhere between 4 minutes and 30 minutes. For both v1 and v2 Application Gateways, you need to navigate to the public IP of the Application Gateway and change the TCP idle timeout under the "Configuration" blade of the public IP on Portal. Changing the value of the private IP address isn't supported. You can set the TCP idle timeout value of the public IP through PowerShell by running the following commands:
$publicIP = Get-AzPublicIpAddress -Name MyPublicIP -ResourceGroupName MyResourceGroup $publicIP.IdleTimeoutInMinutes = "15" Set-AzPublicIpAddress -PublicIpAddress $publicIP
For HTTP/2 connections to the frontend IP address on Application Gateway v2 SKU, the idle timeout is set to 180 seconds and is non-configurable.
Does Application Gateway reuse the TCP connection that is established with backend server?
Yes. Application Gateway reuses the existing TCP connections with backend server.
Can I rename my Application Gateway resource?
No. There's no way to rename an Application Gateway resource. You must create a new resource with a different name.
Is there a way to restore an Application Gateway and its public IP if it has been deleted?
No. There's no way to restore an Application Gateway resource or its public IP once deleted. You must create a new resource.
Does the IP or DNS name change over the lifetime of the application gateway?
In Application Gateway V1 SKU, the VIP can change if you stop and start the application gateway. But the DNS name associated with the application gateway doesn't change over the lifetime of the gateway. Because the DNS name doesn't change, you should use a CNAME alias and point it to the DNS address of the application gateway. In Application Gateway V2 SKU, IP addresses are static, so the IP address and DNS name won't change over the lifetime of the application gateway.
Does Application Gateway support static IP?
Yes, the Application Gateway v2 SKU supports static public IP addresses and static internal IPs. The v1 SKU supports static internal IPs.
Does Application Gateway support multiple public IPs on the gateway?
An application gateway supports only one public IP address.
How large should I make my subnet for Application Gateway?
Can I deploy more than one Application Gateway resource to a single subnet?
Yes. In addition to multiple instances of a given Application Gateway deployment, you can provision another unique Application Gateway resource to an existing subnet that contains a different Application Gateway resource.
A single subnet can't support both v2 and v1 Application Gateway SKUs.
Does Application Gateway v2 support user-defined routes (UDR)?
Yes, but only specific scenarios. For more information, see Application Gateway infrastructure configuration.
Does Application Gateway support x-forwarded-for headers?
Yes. See Modifications to a request.
How long does it take to deploy an application gateway? Will my application gateway work while it's being updated?
New Application Gateway v1 SKU deployments can take up to 20 minutes to provision. Changes to instance size or count aren't disruptive, and the gateway remains active during this time.
Most deployments that use the v2 SKU take around 6 minutes to provision. However it can take longer depending on the type of deployment. For example, deployments across multiple Availability Zones with many instances can take more than 6 minutes.
How does application gateway handle routine maintenance?
Updates initiated to Application Gateway are applied one update domain at a time. As each update domain's instances are being updated, the remaining instances in other update domains will continue to serve traffic1. Active connections are gracefully drained from the instances being updated for up to 5 minutes to help establish connectivity to instances in a different update domain before the update begins. During update, Application Gateway will temporarily run at reduced max capacity, which is determined by the number of instances configured. The update process will proceed to the next set of instances only if the current set of instances have been upgraded successfully.
1 A minimum instance count of 2 is recommended to be configured for Application Gateway v1 SKU deployments to ensure at least one instance can serve traffic while updates are applied.
Can I use Exchange Server as a backend with Application Gateway?
Application Gateway doesn't support email protocols such as SMTP, IMAP, and POP3. HTTP/HTTPS services such as OWA, ActiveSync, and AutoDiscovery traffic may flow through Application Gateway, however WAF exclusions may be required if using WAF sku.
Is there guidance available to migrate from the v1 SKU to the v2 SKU?
Yes. For details see, Migrate Azure Application Gateway and Web Application Firewall from v1 to v2.
Is Application Gateway v1 SKU supported?
Yes. The Application Gateway v1 SKU continues to be supported. However, it's strongly recommended to move to v2 to take advantage of the feature updates in that SKU. For more information on the differences between v1 and v2 features, see Autoscaling and Zone-redundant Application Gateway v2. You can manually migrate Application Gateway v1 sku deployments to v2 by following our v1-v2 migration document.
Does Application Gateway V2 support proxying requests with NTLM or Kerberos authentication?
No. Application Gateway V2 doesn't support proxying requests with NTLM or Kerberos authentication.
Why are some header values not present when requests are forwarded to my application?
Request header names can contain alphanumeric characters and hyphens. Request header names containing other characters are discarded when a request is sent to the backend target. Response header names can contain any alphanumeric characters and specific symbols as defined in RFC 7230, except for underscores (_).
Does Application Gateway affinity cookie support SameSite attribute?
Yes, the Chromium browser v80 update introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
To support this scenario, Application Gateway injects another cookie called ApplicationGatewayAffinityCORS in addition to the existing ApplicationGatewayAffinity cookie. These cookies are similar, but the ApplicationGatewayAffinityCORS cookie has two more attributes added to it: SameSite=None; Secure. These attributes maintain sticky sessions even for cross-origin requests. See the cookie based affinity section for more information.
What is considered an active listener versus inactive listener?
An active listener is a listener that is associated to a rule and sending traffic to a backend pool. Any listener that only redirects traffic isn't an active listener. Listeners associated with redirect rules aren't considered active. If the redirect rule is a path-based rule, then all the paths in that redirect rule must be redirecting traffic, else the listener is considered active. See Azure subscription and service limits, quotas, and constraints for individual component limit details.
How does Application Gateway support high availability and scalability?
The Application Gateway v1 SKU supports high-availability scenarios when you've deployed two or more instances. Azure distributes these instances across update and fault domains to ensure that instances don't all fail at the same time. The v1 SKU supports scalability by adding multiple instances of the same gateway to share the load.
The v2 SKU automatically ensures that new instances are spread across fault domains and update domains. If you choose zone redundancy, the newest instances are also spread across availability zones to offer zonal failure resiliency.
How do I achieve a DR scenario across datacenters by using Application Gateway?
Use Traffic Manager to distribute traffic across multiple application gateways in different datacenters.
Does Application Gateway support connection draining?
Yes. You can set up connection draining to change members within a backend pool without disruption. For more information, see connection draining section of Application Gateway.
Does Application Gateway support autoscaling?
Yes, the Application Gateway v2 SKU supports autoscaling. For more information, see Autoscaling and Zone-redundant Application Gateway.
Does manual or automatic scale up or scale down cause downtime?
No. Instances are distributed across upgrade domains and fault domains.
Can I change from Standard to WAF sku without disruption?
Can I change instance size from medium to large without disruption?
Is Application Gateway always deployed in a virtual network?
Yes. Application Gateway is always deployed in a virtual network subnet. This subnet can contain only application gateways. For more information, see virtual network and subnet requirements.
Can Application Gateway communicate with instances outside of its virtual network or outside of its subscription?
As long as you have IP connectivity, Application Gateway can communicate with instances outside of the virtual network that it's in. Application Gateway can also communicate with instances outside of the subscription it's in. If you plan to use internal IPs as backend pool members, use virtual network peering or Azure VPN Gateway.
Why am I seeing 502 errors or unhealthy backend servers after I changed the DNS servers for the virtual network?
The instances of your application gateway use the virtual network's DNS configuration for name resolution. After changing any DNS server configuration, you need to restart (Stop and Start) the application gateway for the new DNS servers to get assigned. Until then, FQDN-based name resolutions for outbound connectivity could fail.
Can I deploy anything else in the application gateway subnet?
No. But you can deploy other application gateways in the subnet.
Can I change the virtual network or subnet for an existing Application Gateway?
You can move an Application Gateway across subnets within the same virtual network only. It's supported with V1 with public and private frontend, and V2 with public frontend only. It's also important to note that the Application Gateway should be in a Stopped state to perform this action. Keep in mind that stopping/starting V1 changes the public IP. This operation can only be done using Azure PowerShell and Azure CLI by running the following commands:
$VNet = Get-AzVirtualNetwork -Name "<VNetName>" -ResourceGroupName "<ResourceGroup>" $Subnet = Get-AzVirtualNetworkSubnetConfig -Name "<NewSubnetName>" -VirtualNetwork $VNet $AppGw = Get-AzApplicationGateway -Name "<ApplicationGatewayName>" -ResourceGroupName "<ResourceGroup>" Stop-AzApplicationGateway -ApplicationGateway $AppGw $AppGw = Set-AzApplicationGatewayIPConfiguration -ApplicationGateway $AppGw -Name $AppGw.GatewayIPConfigurations.Name -Subnet $Subnet #If you have a private frontend IP configuration, uncomment and run the next line: #$AppGw = Set-AzApplicationGatewayFrontendIPConfig -Name $AppGw.FrontendIPConfigurations.Name -Subnet $Subnet -ApplicationGateway $AppGw Set-AzApplicationGateway -ApplicationGateway $AppGw
For more information, see Set-AzApplicationGatewayIPConfiguration.
az network application-gateway stop -g <ResourceGroup> -n <ApplicationGatewayName> az network application-gateway update -g <ResourceGroup> -n <ApplicationGatewayName> --set gatewayIpConfigurations.subnet.id=<subnetID>
Are network security groups supported on the application gateway subnet?
Does the application gateway subnet support user-defined routes?
Are service endpoint policies supported in the Application Gateway subnet?
No. Service endpoint policies for storage accounts aren't supported in Application Gateway subnet and configuring it blocks Azure infrastructure traffic.
What are the limits on Application Gateway? Can I increase these limits?
Can I simultaneously use Application Gateway for both external and internal traffic?
Yes. Application Gateway supports one internal IP and one external IP per application gateway.
Does Application Gateway support virtual network peering?
Yes. Virtual network peering helps load-balance traffic in other virtual networks.
Can I talk to on-premises servers when they're connected by ExpressRoute or VPN tunnels?
Yes, as long as traffic is allowed.
Can one backend pool serve many applications on different ports?
Microservice architecture is supported. To probe on different ports, you need to configure multiple HTTP settings.
Do custom probes support wildcards or regex on response data?
How are routing rules processed in Application Gateway?
For custom probes, what does the Host field signify?
The Host field specifies the name to send the probe to when you've configured multisite on Application Gateway. Otherwise use '127.0.0.1'. This value is different from the virtual machine host name. Its format is <protocol>://<host>:<port><path>.
Can I allow Application Gateway access to only a few source IP addresses?
Yes. See restrict access to specific source IPs.
Can I use the same port for both public-facing and private-facing listeners?
Yes, you can use public-facing and private-facing listeners with the same port number to simultaneously support both public and private clients (feature in Preview). Note that if a Network Security Group (NSG) is associated with your application gateway's subnet, a specific Inbound rule may be needed depending on its configuration. Know more.
Does Application Gateway support IPv6?
Application Gateway v2 doesn't currently support IPv6. It can operate in a dual stack VNet using only IPv4, but the gateway subnet must be IPv4-only. Application Gateway v1 doesn't support dual stack VNets.
Does Application Gateway support FIPS?
Application Gateway v1 SKUs can run in a FIPS 140-2 approved mode of operation, commonly referred to as "FIPS mode". FIPS mode calls a FIPS 140-2 validated cryptographic module that ensures FIPS-compliant algorithms for encryption, hashing, and signing when enabled. To ensure FIPS mode is enabled, the FIPSMode setting must be configured via PowerShell, ARM Template, or REST API once the subscription has been enrolled to enable configuration of FIPSmode.
How do I use Application Gateway V2 with only private frontend IP address?
Application Gateway V2 currently supports private IP frontend configuration only (no public IP) via public preview. More information can be found here.
For current general availability support, Application Gateway V2 supports the following combinations
- Private IP and Public IP
- Public IP only
To restrict traffic only to private IP addresses with current functionality, you can follow the process below:
Create an Application Gateway with both public and private frontend IP address
Don't create any listeners for the public frontend IP address. Application Gateway won't listen to any traffic on the public IP address if no listeners are created for it.
Create and attach a Network Security Group for the Application Gateway subnet with the following configuration in the order of priority:
a. Allow traffic from Source as GatewayManager service tag and Destination as Any and Destination port as 65200-65535. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
b. Allow traffic from Source as AzureLoadBalancer service tag and destination port as Any
c. Deny all inbound traffic from Source as Internet service tag and destination port as Any. Give this rule the least priority in the inbound rules
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address isn't blocked
e. Outbound internet connectivity can't be blocked. Otherwise, you face issues with logging, metrics, etc.
Sample NSG configuration for private IP only access:
How can I stop and start Azure Application Gateway?
You can use Azure PowerShell or the Azure CLI to stop and start Azure Application Gateway. When you stop and start Application Gateway, billing also stops and starts. Any PUT operation done on a Stopped Application Gateway (like adding tag, health probe, listener etc.) triggers a Start. It's recommended to Stop the application gateway once the configuration has been updated.
# Stop an existing Azure Application Gateway instance $appGateway = Get-AzApplicationGateway -Name $appGatewayName -ResourceGroupName $resourceGroupName Stop-AzApplicationGateway -ApplicationGateway $appGateway
# Start an existing Azure Application Gateway instance $appGateway = Get-AzApplicationGateway -Name $appGatewayName -ResourceGroupName $resourceGroupName Start-AzApplicationGateway -ApplicationGateway $appGateway
# Stop an existing Azure Application Gateway instance az network application-gateway stop -g MyResourceGroup -n MyAppGateway
# Start an existing Azure Application Gateway instance az network application-gateway start -g MyResourceGroup -n MyAppGateway
Configuration - TLS
What certificates does Application Gateway support?
Application Gateway supports self-signed certificates, certificate authority (CA) certificates, Extended Validation (EV) certificates, multi-domain (SAN) certificates, and wildcard certificates.
What cipher suites does Application Gateway support?
Application Gateway supports the following cipher suites.
For information on how to customize TLS options, see Configure TLS policy versions and cipher suites on Application Gateway.
Does Application Gateway support reencryption of traffic to the backend?
Yes. Application Gateway supports TLS offload and end-to-end TLS, which reencrypt traffic to the backend.
Can I configure TLS policy to control TLS protocol versions?
Yes. You can configure Application Gateway to deny TLS1.0, TLS1.1, and TLS1.2. By default, SSL 2.0 and 3.0 are already disabled and aren't configurable.
Can I configure cipher suites and policy order?
Yes. In Application Gateway, you can configure cipher suites. To define a custom policy, enable at least one of the following cipher suites.
Application Gateway uses SHA256 to for backend management.
How many TLS/SSL certificates does Application Gateway support?
Application Gateway supports up to 100 TLS/SSL certificates.
Does Application Gateway have support for OCSP and OCSP stapling?
Yes, Application Gateway supports certificates with OCSP extensions and OCSP stapling for server certificates.
How many authentication certificates for backend reencryption does Application Gateway support?
Application Gateway supports up to 100 authentication certificates.
Does Application Gateway natively integrate with Azure Key Vault?
Yes, the Application Gateway v2 SKU supports Key Vault. For more information, see TLS termination with Key Vault certificates.
How do I configure HTTPS listeners for .com and .NET sites?
For multiple domain-based (host-based) routing, you can create multisite listeners, set up listeners that use HTTPS as the protocol, and associate the listeners with the routing rules. For more information, see Hosting multiple sites by using Application Gateway.
Can I use special characters in my .pfx file password?
No, use only alphanumeric characters in your .pfx file password.
My EV certificate is issued by DigiCert and my intermediate certificate has been revoked. How do I renew my certificate on Application Gateway?
Certificate Authority (CA) Browser members recently published reports detailing multiple certificates issued by CA vendors that are used by our customers, Microsoft, and the greater technology community that were out of compliance with industry standards for publicly trusted CAs. The reports regarding the non-compliant CAs can be found here:
As per the industry's compliance requirements, CA vendors began revoking non-compliant CAs and issuing compliant CAs, which requires customers to have their certificates reissued. Microsoft is partnering closely with these vendors to minimize the potential impact to Azure Services, however your self-issued certificates or certificates used in “Bring Your Own Certificate” (BYOC) scenarios are still at risk of being unexpectedly revoked.
To check if certificates utilized by your application have been revoked reference DigiCert's Announcement and the Certificate Revocation Tracker. If your certificates have been revoked, or will be revoked, you need to request new certificates from the CA vendor utilized in your applications. To avoid your application's availability being interrupted due to certificates being unexpectedly revoked, or to update a certificate that has been revoked, please refer to our Azure updates post for remediation links of various Azure services that support BYOC: https://azure.microsoft.com/updates/certificateauthorityrevocation/
For Application Gateway specific information, see below -
If you're using a certificate issued by one of the revoked ICAs, your application's availability might be interrupted and depending on your application, you may receive various error messages including but not limited to:
- Invalid certificate/revoked certificate
- Connection timed out
- HTTP 502
To avoid any interruption to your application due to this issue, or to reissue a CA that has been revoked, you need to take the following actions:
- Contact your certificate provider on how to reissue your certificates.
- Once reissued, update your certificates on the Azure Application Gateway/WAF with the complete chain of trust (leaf, intermediate, root certificate). Based on where you're using your certificate, either on the listener or the HTTP settings of the Application Gateway, follow the steps below to update the certificates and check the documentation links mentioned for more information.
- Update your backend application servers to use the reissued certificate. Depending on the backend server that you're using, your certificate update steps may vary. Check for the documentation from your vendor.
To update the certificate in your listener:
- In the Azure portal, open your Application Gateway resource.
- Open the listener settings that's associated with your certificate.
- Click "Renew or edit selected certificate."
- Upload your new PFX certificate with the password and click Save.
- Access the website and verify if the site is working as expected. For more information, see Renew Application Gateway certificates.
If you're referencing certificates from Azure KeyVault in your Application Gateway listener, we recommend the following the steps for a quick change –
- In the Azure portal, navigate to your Azure KeyVault settings that are associated with the Application Gateway.
- Add/import the reissued certificate in your store. See documentation here for more information on how-to.
- Once the certificate has been imported, navigate to your Application Gateway listener settings and under "Choose a certificate from Key Vault", click on the "Certificate" drop-down and choose the recently added certificate
- Click Save For more information on TLS termination on Application Gateway with Key Vault certificates, see TLS termination with Key Vault certificates.
To update the certificate in your HTTP Settings:
If you're using V1 SKU of the Application Gateway/WAF service, then you would have to upload the new certificate as your backend authentication certificate.
- In the Azure portal, open your Application Gateway resource.
- Open the HTTP settings that's associated with your certificate.
- Click on "Add certificate" and upload the reissued certificate and click save.
- You can remove the old certificate later by clicking on the "..." options button next to the old certificate and select delete and click save. For more information, see Configure end-to-end TLS by using Application Gateway with the portal.
If you're using the V2 SKU of the Application Gateway/WAF service, you don't have to upload the new certificate in the HTTP settings since V2 SKU uses "trusted root certificates", and no action needs to be taken here.
Configuration - ingress controller for AKS
What is an Ingress Controller?
Kubernetes allows creation of
service resource to expose a group of pods internally in the cluster. To expose the same service externally, an
Ingress resource is defined which provides load balancing, TLS termination and name-based virtual hosting.
To satisfy this
Ingress resource, an Ingress Controller is required which listens for any changes to
Ingress resources and configures the load balancer policies.
The Application Gateway Ingress Controller (AGIC) allows Azure Application Gateway to be used as the ingress for an Azure Kubernetes Service also known as an AKS cluster.
Can a single ingress controller instance manage multiple Application Gateways?
Currently, one instance of Ingress Controller can only be associated to one Application Gateway.
Why is my AKS cluster with kubenet not working with AGIC?
AGIC tries to automatically associate the route table resource to the Application Gateway subnet but may fail to do so due to lack of permissions from the AGIC. If AGIC is unable to associate the route table to the Application Gateway subnet, there will be an error in the AGIC logs saying so, in which case you have to manually associate the route table created by the AKS cluster to the Application Gateway's subnet. For more information, see Supported user-defined routes.
Can I connect my AKS cluster and Application Gateway in separate virtual networks?
Yes, as long as the virtual networks are peered and they don't have overlapping address spaces. If you're running AKS with kubenet, then be sure to associate the route table generated by AKS to the Application Gateway subnet.
What features aren't supported on the AGIC add-on?
See the differences between AGIC deployed through Helm versus deployed as an AKS add-on here
When should I use the add-on versus the Helm deployment?
Please see the differences between AGIC deployed through Helm versus deployed as an AKS add-on here, especially the tables documenting which scenario(s) are supported by AGIC deployed through Helm as opposed to an AKS add-on. In general, deploying through Helm allows you to test out beta features and release candidates before an official release.
Can I control which version of AGIC will be deployed with the add-on?
No, AGIC add-on is a managed service, which means Microsoft will automatically update the add-on to the latest stable version.
Configuration - mutual authentication
What is mutual authentication?
Mutual authentication is two-way authentication between a client and a server. Mutual authentication with Application Gateway currently allows the gateway to verify the client sending the request, which is client authentication. Typically, the client is the only one that authenticates the Application Gateway. Because Application Gateway can now also authenticate the client, it becomes mutual authentication where Application Gateway and the client are mutually authenticating each other.
Is mutual authentication available between Application Gateway and its backend pools?
No, mutual authentication is currently only between the frontend client and the Application Gateway. Backend mutual authentication is currently not supported.
Diagnostics and logging
What types of logs does Application Gateway provide?
Application Gateway provides three logs:
- ApplicationGatewayAccessLog: The access log contains each request submitted to the application gateway frontend. The data includes the caller's IP, URL requested, response latency, return code, and bytes in and out. It contains one record per application gateway.
- ApplicationGatewayPerformanceLog: The performance log captures performance information for each application gateway. Information includes the throughput in bytes, total requests served, failed request count, and healthy and unhealthy backend instance count.
- ApplicationGatewayFirewallLog: For application gateways that you configure with WAF, the firewall log contains requests that are logged through either detection mode or prevention mode.
All logs are collected every 60 seconds. For more information, see Backend health, diagnostics logs, and metrics for Application Gateway.
How do I know if my backend pool members are healthy?
Verify health by using the PowerShell cmdlet
Get-AzApplicationGatewayBackendHealth or the portal. For more information, see Application Gateway diagnostics.
What's the retention policy for the diagnostic logs?
Diagnostic logs flow to the customer's storage account. Customers can set the retention policy based on their preference. Diagnostic logs can also be sent to an event hub or Azure Monitor logs. For more information, see Application Gateway diagnostics.
How do I get audit logs for Application Gateway?
In the portal, on the menu blade of an application gateway, select Activity Log to access the audit log.
Can I set alerts with Application Gateway?
Yes. In Application Gateway, alerts are configured on metrics. For more information, see Application Gateway metrics and Receive alert notifications.
How do I analyze traffic statistics for Application Gateway?
You can view and analyze access logs in several ways. Use Azure Monitor logs, Excel, Power BI, and so on.
You can also use a Resource Manager template that installs and runs the popular GoAccess log analyzer for Application Gateway access logs. GoAccess provides valuable HTTP traffic statistics such as unique visitors, requested files, hosts, operating systems, browsers, and HTTP status codes. For more information, in GitHub, see the Readme file in the Resource Manager template folder.
What could cause backend health to return an unknown status?
Usually, you see an unknown status when access to the backend is blocked by a network security group (NSG), custom DNS, or user-defined routing (UDR) on the application gateway subnet. For more information, see Backend health, diagnostics logging, and metrics for Application Gateway.
Are NSG flow logs supported on NSGs associated to Application Gateway v2 subnet?
Due to current platform limitations, if you have an NSG on the Application Gateway v2 (Standard_v2, WAF_v2) subnet and if you have enabled NSG flow logs on it, you see nondeterministic behavior and this scenario is currently not supported.
Where does Application Gateway store customer data?
Application Gateway doesn't move or store customer data out of the region it's deployed in.
To learn more about Application Gateway, see What is Azure Application Gateway?. To learn about TLS termination and end to end TLS with Application Gateway, see Enabling end to end TLS on Azure Application Gateway.