You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/migrate-v1-v2.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -219,7 +219,7 @@ The legacy script takes the following parameters:
219
219
220
220
You can pass in `$mySslCert1, $mySslCert2` (comma separated) in the previous example as values for this parameter in the script.
221
221
222
-
-`sslCertificates`. You use this optional parameter for downloading the certificates stored in Azure Key Vault and pass it to migration script. To download the certificate as a PFX file, run the following command. These commands access `SecretId` and then save the content as a PFX file.
222
+
-`sslCertificates`. You use this optional parameter to download the certificates stored in Azure Key Vault and pass it to the migration script. To download the certificate as a PFX file, run the following command. These commands access `SecretId` and then save the content as a PFX file.
@@ -267,7 +267,7 @@ The legacy script takes the following parameters:
267
267
268
268
2. Use `Import-Module Az` to import the Az modules.
269
269
270
-
3. Run the `Set-AzContext` cmdlet to set the active Azure context to the correct subscription. This is an important step because the migration script might clean up the existing resource group if it doesn't exist in current subscription context.
270
+
3. Run the `Set-AzContext` cmdlet to set the active Azure context to the correct subscription. This step is important because the migration script might clean up the existing resource group if it doesn't exist in current subscription context.
@@ -323,7 +323,7 @@ The legacy script takes the following parameters:
323
323
324
324
- The Web Application Firewall V2 instance is created in the old Web Application Firewall configuration mode. Migration to the Web Application Firewall policy is required.
325
325
326
-
- Web Application Firewall V2 is configured to use CRS 3.0 by default. ?Because CRS 3.0 is on the path to deprecation, upgrade to the latest rule set (DRS 2.2) after migration. For more information, refer to [CRS and DRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md).
326
+
- Web Application Firewall V2 is configured to use CRS 3.0 by default. Because CRS 3.0 is on the path to deprecation, upgrade to the latest rule set (DRS 2.2) after migration. For more information, refer to [CRS and DRS rule groups and rules](../web-application-firewall/ag/application-gateway-crs-rulegroups-rules.md).
327
327
328
328
> [!NOTE]
329
329
> Application Gateway V2 supports NTLM and Kerberos passthrough authentication. For more information, refer to [Dedicated backend connection](configuration-http-settings.md#dedicated-backend-connection).
@@ -344,13 +344,13 @@ To determine if you have the Azure Az modules installed, run `Get-InstalledModul
344
344
345
345
To use this option, you must not have the Azure Az modules installed on your computer. If they're installed, the following command displays an error. You can either uninstall the Azure Az modules or use the other option to download the script manually and run it.
346
346
347
-
Run the script with the one of the following commands to get the latest version:
347
+
Run the script with one of the following commands to get the latest version:
348
348
349
349
- For the enhanced cloning script with public IP retention, use `Install-Script -Name AzureAppGWIPMigrate -Force`.
350
350
- For the enhanced cloning script, use `Install-Script -Name AzureAppGWClone -Force`.
351
351
- For the legacy cloning script, use `Install-Script -Name AzureAppGWMigration -Force`.
352
352
353
-
This command also installs the required Az modules.
353
+
The command also installs the required Az modules.
354
354
355
355
### Install by using the script directly
356
356
@@ -405,7 +405,7 @@ You can download this public IP retention script from the [PowerShell Gallery](h
405
405
406
406
This script requires the following mandatory parameters:
407
407
408
-
- `v1resourceId`. The resource ID of the V1 gateway whose Public IP will be reserved and associated with V2.
408
+
- `v1resourceId`. The resource ID of the V1 gateway whose public IP will be reserved and associated with V2.
409
409
- `v2resourceId`. The resource ID of the V2 gateway to which the V1 public IP will be assigned. You can create the V2 gateway manually or by using any one of the cloning scripts.
410
410
411
411
After you download and [install the script](../application-gateway/migrate-v1-v2.md#installing-the-script), run `AzureAppGWIPMigrate.ps1` with the required parameters:
@@ -440,13 +440,13 @@ The following items are a few scenarios where your current application gateway (
440
440
441
441
- If you use public IP addresses on your application gateway, you can do a controlled, granular migration by using an Azure Traffic Manager profile to incrementally route traffic to the new V2 gateway.
442
442
443
-
You can use this weighted traffic-routing method by adding the DNS labels of both the V1 and V2 application gateways to the [Traffic Manager profile](../traffic-manager/traffic-manager-routing-methods.md#weighted-traffic-routing-method). Then, apply CNAME on your custom DNS record (for example, `www.contoso.com`) to the Traffic Manager domain (for example, `contoso.trafficmanager.net`).
443
+
You can use this weighted traffic-routing method by adding the DNS labels of both the V1 and V2 application gateways to the [Traffic Manager profile](../traffic-manager/traffic-manager-routing-methods.md#weighted-traffic-routing-method). Then, apply CNAME on your custom DNS record (for example, `www.contoso.com`) to the Traffic Manager domain (for example, `contoso.trafficmanager.net`).
444
444
445
445
- You can update your custom domain DNS record to point to the DNS label of the new V2 application gateway. Depending on the TTL configured on your DNS record, it can take a while for all your client traffic to migrate to your new V2 gateway.
446
446
447
447
-**Your clients connect to the frontend IP address of your application gateway**.
448
448
449
-
Update your clients to use the IP address associated with the newly created V2 application gateway. We recommend that you don't use IP addresses directly. Consider using the DNS name label (for example, `yourgateway.eastus.cloudapp.azure.com`) associated with your application gateway that you can apply CNAME to your own custom DNS zone (for example, `contoso.com`).
449
+
Update your clients to use the IP address associated with the newly created V2 application gateway. We recommend that you don't use IP addresses directly. Consider using the DNS name label (for example, `yourgateway.eastus.cloudapp.azure.com`) associated with your application gateway that you can apply to your own custom DNS zone via CNAME (for example, `contoso.com`).
450
450
451
451
## Post-migration tasks
452
452
@@ -467,20 +467,20 @@ Application Gateway V2 comes with a range of advantages, such as:
467
467
- Policy associations.
468
468
- Bot protection.
469
469
470
-
It also offers high scalability, optimized traffic routing, and seamless integration with Azure services. These features can improve the overall user experience, prevent slowdowns during times of heavy traffic, and avoid expensive data breaches.
470
+
Application Gateway V2 also offers high scalability, optimized traffic routing, and seamless integration with Azure services. These features can improve the overall user experience, prevent slowdowns during times of heavy traffic, and avoid expensive data breaches.
471
471
472
472
Five variants are available in V1, based on the tier and size: Standard Small, Standard Medium, Standard Large, Web Application Firewall Medium, and Web Application Firewall Large. For pricing information according to your region, see the [pricing page](https://azure.microsoft.com/pricing/details/application-gateway/).
473
473
474
-
The scenarios in the following table are examples and are for illustration purposes only. The calculations are based on East US and for a gateway with two instances in V1. The variable cost in V2 is based on one of the three dimensions with highest usage: new connections (50 per second), persistent connections (2,500 per minute), and throughput (2.22 Mbps per capacity unit).
474
+
The scenarios in the following table are examples for illustration purposes only. The calculations are based on East US and for a gateway with two instances in V1. The variable cost in V2 is based on one of the three dimensions with highest usage: new connections (50 per second), persistent connections (2,500 per minute), and throughput (2.22 Mbps per capacity unit).
| Standard Medium | 102.2 | 179.8 | V2 can handle a larger number of requests than a V1 gateway, so we recommend consolidating multiple V1 gateways into a single V2 gateway, to optimize the cost. Ensure that consolidation doesn't exceed the Application Gateway [limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-application-gateway-limits). We recommend 3:1 consolidation. |
478
+
| Standard Medium | 102.2 | 179.8 | V2 can handle a larger number of requests than a V1 gateway, so we recommend consolidating multiple V1 gateways into a single V2 gateway to optimize the cost. Ensure that consolidation doesn't exceed the Application Gateway [limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-application-gateway-limits). We recommend 3:1 consolidation. |
479
479
| Web Application Firewall Medium | 183.96 | 262.8 | Same as for Standard Medium |
480
-
| Standard Large | 467.2 | 179.58 | For these variants, in most cases, moving to a V2 gateway can provide you with a better price benefit compared to V1. |
480
+
| Standard Large | 467.2 | 179.58 | For these variants, in most cases, moving to a V2 gateway can provide a better price benefit compared to V1. |
481
481
| Web Application Firewall Large | 654.08 | 262.8 | Same as for Standard Large. |
482
482
483
-
For further concerns regarding the pricing, work with your account manager or get in touch with our support team for assistance.
483
+
For further concerns about the pricing, work with your account manager or get in touch with our support team for assistance.
0 commit comments