Nifi upstream connect error with https

Nho Luong 25 Reputation points
2025-03-26T04:00:56.2033333+00:00
upstream connect error or disconnect/reset before headers. retried and the latest reset reason: remote connection failure, transport failure reason: delayed connect error: 111

Hi All,

I have deploy apache/nifi:1.19.1 and EXPOSE 8080 and my azure container app running but then i have access my URLs on browser then show error:

==============
"" => upstream connect error or disconnect/reset before headers. retried and the latest reset reason: remote connection failure, transport failure reason: delayed connect error: 111upstream connect error or disconnect/reset before headers. retried and the latest reset reason: remote connection failure, transport failure reason: delayed connect error: 111""

Current i have use Azure Application Gateway (Standard_v2) and don't have configuration with authentication_certificate then i only use trusted root cert from my provider, i mean i NO use CA from Let's Encrypt or Cert self-signed

Then i have debugs an my App Gateway SKU: Standard_v2 no support ❌ truststore and No support setup with authentication_certificate
=> The NiFi backend is requesting TLS (either mTLS or strict TLS handshake), while Application Gateway is not authenticating or not getting the trusted certificate (because you are using Standard_v2)

QUESTIONs:

**The problem is that my current customer wants to save costs when using azure and still wants to keep the current Standard_v2 version, so how can I use https with port 433, or 8443 for Nifi and App Gateway SKU: Standard_v2 is still supported

I mean still use Standard_v2 and how to bypass the configuration of https for the current Nifi**

Azure Application Gateway
Azure Application Gateway
An Azure service that provides a platform-managed, scalable, and highly available application delivery controller as a service.
1,172 questions
{count} votes

Accepted answer
  1. Venkat V 1,485 Reputation points Microsoft External Staff
    2025-03-28T05:14:54.4+00:00

    Hi @Nho Luong

    Can you please follow the approach below and confirm? This was also suggested by @Alex Burlachenko

    An external user sends an HTTPS request tohttps://<app-gateway-domain>/nifi The application gateway receives this request on port 443 and performs SSL termination.

    The decrypted HTTP traffic is then forwarded by the Application Gateway to NiFi on port 8080 (as NiFi is configured to accept HTTP internally). NiFi, which is running on HTTP internally, processes the request and sends the response back to the Application Gateway.

    Since the communication between NiFi and the Application Gateway happens over HTTP, the traffic is unencrypted. However, when the application gateway sends the response back to the external user, the response is re-encrypted as it is sent through the SSL connection (on HTTPS port 443).

    With this setup, the Application Gateway handles SSL termination and forwards unencrypted HTTP traffic to NiFi. This approach is easier to manage and more cost-effective, meeting the user’s requirement to use the Standard_v2 SKU while keeping the system secure and functional.

    **I hope this helps to resolve your issue. Please feel free to ask any questions if the solution provided isn't helpful.

    **
    I really appreciate your feedback. It’s valuable to us. Please click Accept Answer on this post to assist other community members facing similar issues in finding the correct solution.


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.