You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/migrate-v1-v2.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ For more information about the retirement of Application Gateway V1, see [Migrat
21
21
22
22
## Why migrate to V2?
23
23
24
-
[Application Gateway and Web Application Firewall V2](application-gateway-autoscaling-zone-redundant.md)offers the following benefits over V1:
24
+
[Application Gateway V2 and Web Application Firewall V2](application-gateway-autoscaling-zone-redundant.md)offer the following benefits over V1:
25
25
26
26
-**Resiliency**. Availability zone redundancy and autoscale.
27
27
-**Security**. Azure Key Vault integration, improved Web Application Firewall capabilities, and bot protection.
@@ -51,7 +51,7 @@ This article focuses on the configuration stage of migration. Migration of clien
51
51
52
52
- For V1, authentication certificates are required to set up TLS connections with backend servers. V2 requires uploading [trusted root certificates](./certificates-for-backend-authentication.md) for the same purpose. Whereas V1 allows the use of self-signed certificates as authentication certificates, V2 mandates [generating and uploading a self-signed root certificate](./self-signed-certificates.md) if self-signed certificates are used in the backend.
53
53
54
-
- If you enable network isolation on the subscription, you must deploy all Application Gateway v2 deployments, whether publiconly or privateonly, in a subnet delegated to `Microsoft.Network/applicationGateways`. Use the [steps to set up subnet delegation](/azure/virtual-network/manage-subnet-delegation?tabs=manage-subnet-delegation-portal).
54
+
- If you enable network isolation on the subscription, all Application Gateway V2 public-only or private-only deployments must be in a subnet delegated to `Microsoft.Network/applicationGateways`. Use the [steps to set up subnet delegation](/azure/virtual-network/manage-subnet-delegation?tabs=manage-subnet-delegation-portal).
55
55
56
56
> [!NOTE]
57
57
> Application Gateway V2 includes [customer-controlled backend TLS relaxation](configuration-http-settings.md#backend-https-validation-settings), a capability that streamlines backend certificate validation during migration. You can use this feature to temporarily relax TLS checks by skipping the certificate chain, skipping expiry validation, or overriding Server Name Indication (SNI) validation. This action aligns behavior with what's already permitted in V1.
@@ -73,7 +73,7 @@ The enhanced cloning script is the recommended option. It offers an improved mig
73
73
- Eliminating the need for manual input of frontend SSL certificates and backend trusted root certificates.
74
74
- Supporting the deployment of private-only V2 gateways.
75
75
76
-
You can download the Enhanced cloning script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/AzureAppGWClone).
76
+
You can download the enhanced cloning script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/AzureAppGWClone).
77
77
78
78
### Considerations
79
79
@@ -83,7 +83,7 @@ Private Application Gateway deployments must have subnet delegation configured t
83
83
84
84
### Parameters for the script
85
85
86
-
-`AppGw V1 ResourceId -Required`: Azure resource ID for your existing Standard V1 or Web Application Firewall V1 gateway. To find this string value, go to the Azure portal, select your Application Gateway or Web Application Firewall resource, and then select the **Properties** link for the gateway. The resource ID is on that pane.
86
+
-`AppGw V1 ResourceId -Required`. Azure resource ID for your existing Standard V1 or Web Application Firewall V1 gateway. To find this string value, go to the Azure portal, select your Application Gateway or Web Application Firewall resource, and then select the **Properties** link for the gateway. The resource ID is on that pane.
87
87
88
88
You can also run the following Azure PowerShell commands to get the resource ID:
89
89
@@ -92,21 +92,21 @@ Private Application Gateway deployments must have subnet delegation configured t
92
92
$appgw.Id
93
93
```
94
94
95
-
-`SubnetAddressRange -Required`: Subnet address in CIDR notation, where Application Gateway V2 will be deployed.
95
+
-`SubnetAddressRange -Required`. Subnet address in CIDR notation, where Application Gateway V2 will be deployed.
96
96
97
-
-`AppGwName -Optional`: Name of the V2 application gateway. The default value is `{AppGwV1 Name}_migrated`.
97
+
-`AppGwName -Optional`. Name of the V2 application gateway. The default value is `{AppGwV1 Name}_migrated`.
98
98
99
-
-`AppGwResourceGroupName -Optional`: Name of resource group where the V2 application gateway will be created. If you don't provide it, the Application Gateway V1 resource group is used.
99
+
-`AppGwResourceGroupName -Optional`. Name of resource group where the V2 application gateway will be created. If you don't provide it, the Application Gateway V1 resource group is used.
100
100
101
-
-`PrivateIPAddress -Optional`: Private IP address to be assigned to Application Gateway V2. If you don't provide it, a random private IP is assigned.
101
+
-`PrivateIPAddress -Optional`. Private IP address to be assigned to Application Gateway V2. If you don't provide it, a random private IP is assigned.
102
102
103
-
-`ValidateBackendHealth -Optional`: Post-migration validation by comparing `ApplicationGatewayBackendHealth` responses. If you don't set it, this validation is skipped.
103
+
-`ValidateBackendHealth -Optional`. Post-migration validation by comparing `ApplicationGatewayBackendHealth` responses. If you don't set it, this validation is skipped.
104
104
105
-
-`PublicIpResourceId -Optional`: Resource ID of the public IP address (if it already exists) to be attached to the application gateway. If you don't provide it, the public IP name is `{AppGwName}-IP`.
105
+
-`PublicIpResourceId -Optional`. Resource ID of the public IP address (if it already exists) to be attached to the application gateway. If you don't provide it, the public IP name is `{AppGwName}-IP`.
106
106
107
-
-`DisableAutoscale -Optional`: Option to disable autoscale configuration for Application Gateway V2 instances. It's `false` by default.
107
+
-`DisableAutoscale -Optional`. Option to disable autoscale configuration for Application Gateway V2 instances. It's `false` by default.
108
108
109
-
-`WafPolicyName -Optional`: Name of the Web Application Firewall policy that will be created from the Web Application Firewall V1 configuration and attached to the Web Application Firewall V2 gateway.
109
+
-`WafPolicyName -Optional`. Name of the Web Application Firewall policy that will be created from the Web Application Firewall V1 configuration and attached to the Web Application Firewall V2 gateway.
110
110
111
111
### Steps to run the script
112
112
@@ -197,9 +197,9 @@ The legacy script takes the following parameters:
197
197
198
198
-`appgwName`. You specify this optional string as the name for the new Standard V2 or Web Application Firewall V2 gateway. If you don't supply this parameter, the name of your existing V1 gateway is used with the suffix `_V2` appended.
199
199
200
-
-`AppGWResourceGroupName`. This optional string is the name of the resource group where you want V2 Application Gateway resources to be created. The default value is `<V1-app-gw-rgname>`.
200
+
-`AppGWResourceGroupName`. This optional string is the name of the resource group where you want Application Gateway V2 resources to be created. The default value is `<V1-app-gw-rgname>`.
201
201
202
-
Ensure that there's no existing application gateway with the provided `AppGWV2Name` and `AppGWResourceGroupName` values in the V1 subscription. This parameter rewrites the existing resources.
202
+
Ensure that no existing application gateway with the provided `AppGWV2Name` and `AppGWResourceGroupName` values is in the V1 subscription. This parameter rewrites the existing resources.
203
203
204
204
-`sslCertificates`. This parameter provides a comma-separated list of `PSApplicationGatewaySslCertificate` objects that you create to represent the TLS/SSL certificates from your V1 gateway that must be uploaded to the new V2 gateway.
205
205
@@ -251,7 +251,7 @@ The legacy script takes the following parameters:
251
251
252
252
To create a list of `PSApplicationGatewayTrustedRootCertificate` objects, see [New-AzApplicationGatewayTrustedRootCertificate](/powershell/module/Az.Network/New-AzApplicationGatewayTrustedRootCertificate).
253
253
254
-
-`privateIpAddress`. Use this optional string to provide a specific private IP address that you want to associate to your new V2 gateway. It must be from the same virtual network that you allocate for your new V2 gateway. If you don't specify this parameter, the script allocates a private IP address for your V2 gateway.
254
+
-`privateIpAddress`. Use this optional string to provide a specific private IP address that you want to associate with your new V2 gateway. It must be from the same virtual network that you allocate for your new V2 gateway. If you don't specify this parameter, the script allocates a private IP address for your V2 gateway.
255
255
256
256
-`publicIpResourceId`. Use this optional string to provide the resource ID of an existing public IP address (Standard tier) resource in your subscription that you want to allocate to the new V2 gateway. If you provide the public IP resource name, ensure that it exists in a succeeded state.
257
257
@@ -386,7 +386,7 @@ For the legacy cloning script, version 1.0.11 is the new version of the migratio
386
386
387
387
After you successfully migrate the configuration and thoroughly test your new V2 gateway, this step focuses on redirecting live traffic.
388
388
389
-
We provide an Azure PowerShell script that *retains the public IP address from V1*. Here are important considerations about the script:
389
+
We provide an Azure PowerShell script that *retains the public IP address from V1*. Here are important considerations for the script:
390
390
391
391
- The script reserves the Basic public IP from V1, converts it to Standard, and attaches it to the V2 gateway. This action effectively redirects all incoming traffic to the V2 gateway.
392
392
- This IP swap operation typically results in a brief *downtime of approximately one to five minutes*. Plan accordingly.
@@ -467,17 +467,17 @@ Application Gateway V2 comes with a range of advantages, such as:
467
467
- Policy associations.
468
468
- Bot protection.
469
469
470
-
Application Gateway V2 also offers high scalability, optimized traffic routing, and seamless integration with Azure services. These features can improve the overall user experience, prevent slowdowns during times of heavy traffic, and avoid expensive data breaches.
470
+
Application Gateway V2 also offers high scalability, optimized traffic routing, and seamless integration with Azure services. These features can improve the overall user experience, prevent slowdowns during times of heavy traffic, and help you avoid expensive data breaches.
471
471
472
472
Five variants are available in V1, based on the tier and size: Standard Small, Standard Medium, Standard Large, Web Application Firewall Medium, and Web Application Firewall Large. For pricing information according to your region, see the [pricing page](https://azure.microsoft.com/pricing/details/application-gateway/).
473
473
474
474
The scenarios in the following table are examples for illustration purposes only. The calculations are based on East US and for a gateway with two instances in V1. The variable cost in V2 is based on one of the three dimensions with highest usage: new connections (50 per second), persistent connections (2,500 per minute), and throughput (2.22 Mbps per capacity unit).
| Standard Medium | 102.2 | 179.8 | V2 can handle a larger number of requests than a V1 gateway, so we recommend consolidating multiple V1 gateways into a single V2 gateway to optimize the cost. Ensure that consolidation doesn't exceed the Application Gateway [limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-application-gateway-limits). We recommend 3:1 consolidation. |
479
479
| Web Application Firewall Medium | 183.96 | 262.8 | Same as for Standard Medium |
480
-
| Standard Large | 467.2 | 179.58 | For these variants, in most cases, moving to a V2 gateway can provide a better price benefit compared to V1. |
480
+
| Standard Large | 467.2 | 179.58 | For this variant, in most cases, moving to a V2 gateway can provide a better price benefit compared to V1. |
481
481
| Web Application Firewall Large | 654.08 | 262.8 | Same as for Standard Large. |
482
482
483
483
For further concerns about the pricing, work with your customer success account manager (CSAM) or get in touch with our support team for assistance.
Copy file name to clipboardExpand all lines: articles/application-gateway/retirement-faq.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: mbender
12
12
---
13
13
# Frequently asked questions about Application Gateway V1 retirement
14
14
15
-
On April 28, 2023, Microsoft announced that Application Gateway V1 is retiring on *April 28, 2026*. If you're still using V1 resources, be sure to plan and complete your migration to V2 before this date to avoid service disruptions.
15
+
On April 28, 2023, Microsoft announced that Azure Application Gateway V1 is retiring on *April 28, 2026*. If you're still using V1 resources, be sure to plan and complete your migration to V2 before this date to avoid service disruptions.
16
16
17
17
This article answers commonly asked questions about the V1 retirement timeline, what to expect after retirement, and how to migrate from V1 to V2. For migration guidance, see [Migrate Azure Application Gateway and Web Application Firewall from V1 to V2](./migrate-v1-v2.md).
18
18
@@ -22,7 +22,7 @@ This article answers commonly asked questions about the V1 retirement timeline,
22
22
23
23
As of July 1, 2023, new customers can't create Application Gateway V1 resources. As of September 1, 2024, existing customers can't create V1 resources in existing subscriptions.
24
24
25
-
Although you can no longer create V1 resources, you can manage any existing V1 resources until the retirement date on April 28, 2026.
25
+
Although you can no longer create V1 resources, you can manage any existing V1 resources until the retirement date of April 28, 2026.
26
26
27
27
### What happens to existing Application Gateway V1 resources after April 28, 2026?
28
28
@@ -69,7 +69,7 @@ Yes. Application Gateway V2 supports proxying requests with NTLM or Kerberos aut
69
69
70
70
### How are backend certificate behaviors different between Application Gateway V1 and V2?
71
71
72
-
Application Gateway V1 uses authentication certificates. This mechanism performs an exact match between the certificate configured on Application Gateway and the certificate presented by the backend server. V1 also supports default or fallback certificates if no Server Name Indication (SNI) is available during the TLS handshake.
72
+
Application Gateway V1 uses authentication certificates. This mechanism performs an exact match between the certificate configured on Application Gateway and the certificate from the backend server. V1 also supports default or fallback certificates if no Server Name Indication (SNI) is available during the TLS handshake.
73
73
74
74
By default, Application Gateway V2 performs a more comprehensive validation. It verifies the complete certificate chain and the subject name of the backend server certificate. For more information, see [Backend TLS connection](ssl-overview.md#backend-tls-connection-application-gateway-to-the-backend-server).
We announced the deprecation of Application Gateway V1 on April 28, 2023. On *April 28, 2026*, Application Gateway V1 will be retired. We won't support it after this date.
18
+
We announced the deprecation of Azure Application Gateway V1 on April 28, 2023. On *April 28, 2026*, Application Gateway V1 will be retired. We won't support it after this date.
19
19
20
20
If you use Application Gateway V1, start planning your migration to [Application Gateway V2](./overview-v2.md) now. Complete it by April 28, 2026.
21
21
@@ -47,7 +47,7 @@ Complete the migration as soon as possible to prevent business impact and to tak
47
47
48
48
> [!VIDEO 7ed01e33-80a9-4daa-9322-e771f963a2fe]
49
49
50
-
- For answers to frequently asked questions, see [FAQ on V1 to V2 migration](./retirement-faq.md).
50
+
- For FAQ, see [Frequently asked questions about Application Gateway V1 retirement](./retirement-faq.md).
51
51
52
52
- For the announcement about the capabilities of V2, see the blog post [Taking advantage of the new Azure Application Gateway V2](https://azure.microsoft.com/blog/taking-advantage-of-the-new-azure-application-gateway-v2/).
0 commit comments