Hi @Gallatin 21V,
Since your customer prefers not to modify application code ("no code injection") and is looking for a solution based purely on Azure platform logs (such as Application Insights or Diagnostic Logs). Currently, Azure does not automatically log X-Forwarded-Proto
or the original client port into Application Insights or AppServiceHTTPLogs by default, this means without code changes, you cannot get the original protocol (HTTP/HTTPS) purely from Azure’s standard logs at the App Service level.
If no code changes are allowed but you still need to log the original protocol, as I mentioned in previous response consider using Azure Front Door or Azure Application Gateway, these services sit in front of your App Service, handle TLS termination, and can log client protocol/port into their respective diagnostic logs.
- Azure Front Door logs can show the original client protocol (
HTTPS
/HTTP
) in diagnostic logs. Configure Azure Front Door logs - Application Gateway WAF logs also capture incoming request protocols. Azure Application Gateway diagnostics and access logs