You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/deploy-staging-slots.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -547,6 +547,13 @@ Here are some common swap errors:
547
547
548
548
- Local cache initialization might fail when the app content exceeds the local disk quota specified for the local cache. For more information, see [Local cache overview](overview-local-cache.md).
549
549
550
+
- During a site update operation, the following error may occur "_The slot cannot be changed because its configuration settings have been prepared for swap_". This can occur if either [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) phase 1 has been completed but phase 2 has not yet been performed, or a swap has failed. There are two ways resolve the issue:
551
+
552
+
1. Cancel the swap operation which will reset the site back to the old state
553
+
1. Complete the swap operation which will update site to the desired new state
554
+
555
+
Refer to [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) to learn how to cancel or complete the swap operation.
556
+
550
557
- During [custom warm-up](#Warm-up), the HTTP requests are made internally (without going through the external URL). They can fail with certain URL rewrite rules in *Web.config*. For example, rules for redirecting domain names or enforcing HTTPS can prevent warm-up requests from reaching the app code. To work around this issue, modify your rewrite rules by adding the following two conditions:
Copy file name to clipboardExpand all lines: articles/application-gateway/classic-to-resource-manager.md
+37-12Lines changed: 37 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,27 @@
1
1
---
2
-
title: Application Gateway classic to Resource Manager
3
-
description: Learn about moving Application Gateway resources from the classic deployment model to the Resource Manager deployment model.
2
+
title: Azure Application Gateway classic to Resource Manager
3
+
description: Learn about moving Azure Application Gateway resources from the classic deployment model to the Resource Manager deployment model.
4
4
services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 06/27/2024
8
+
ms.date: 10/02/2024
9
9
ms.author: greglin
10
10
---
11
11
12
-
# Application Gateway classic to Resource Manager migration
12
+
# Application gateway classic to Resource Manager migration
13
13
14
14
Resource Manager enables deploying complex applications through templates, configures virtual machines by using VM extensions, and incorporates access management and tagging. Azure Resource Manager includes scalable, parallel deployment for virtual machines into availability sets. The new deployment model also provides lifecycle management of compute, network, and storage independently.
15
15
You can read more about Azure Resource Manager [features and benefits](../azure-resource-manager/management/overview.md).
16
16
17
-
Application Gateway resources will**not** be migrated automatically as part of VNet migration from classic to Resource Manager.
18
-
As part of VNet migration process as documented at [IaaS resources migration page](/azure/virtual-machines/migration-classic-resource-manager-ps), if you have an Application Gateway resource present on the VNet that you're trying to migrate to Resource Manager deployment model, the automatic migration wouldn't be successful.
17
+
Application gateway resources are**not** migrated automatically as part of VNet migration from classic to Resource Manager.
18
+
As part of VNet migration process as documented at [IaaS resources migration page](/azure/virtual-machines/migration-classic-resource-manager-ps), if you have an application gateway resource present on the VNet that you're trying to migrate to Resource Manager deployment model, the automatic migration wouldn't be successful.
19
19
20
-
In order to migrate your Application Gateway resource to Resource Manager deployment model, you'll have to remove the Application Resource from the VNet before beginning migration and then recreate the Application Gateway resource once migration is complete.
20
+
To migrate your application gateway resource to Resource Manager deployment model, you'll have to remove the Application Resource from the VNet before beginning migration and then recreate the application gateway resource once migration is complete.
21
21
22
-
## Creating a new Application Gateway resource
22
+
## Creating a new application gateway resource
23
23
24
-
For more information on how to set up an Application Gateway resource after VNet migration, you can refer:
24
+
For more information on how to set up an application gateway resource after VNet migration, you can refer:
25
25
26
26
*[Deployment via portal](quick-create-portal.md)
27
27
*[Deployment via PowerShell](quick-create-powershell.md)
@@ -43,13 +43,38 @@ Azure Resource Manager is the latest control plane of Azure responsible for crea
43
43
44
44
### Where can I find more information regarding classic to Azure Resource Manager migration?
45
45
46
-
Please refer to [Frequently asked questions about classic to Azure Resource Manager migration](/azure/virtual-machines/migration-classic-resource-manager-faq)
46
+
Refer to [Frequently asked questions about classic to Azure Resource Manager migration](/azure/virtual-machines/migration-classic-resource-manager-faq)
47
+
48
+
### How can I clean up my classic application gateway deployment?
49
+
50
+
Step 1: Install the old PowerShell version for managing legacy resources.
51
+
52
+
[Installing the Azure PowerShell Service Management module](/powershell/azure/servicemanagement/install-azure-ps)
53
+
54
+
> [!NOTE]
55
+
> The cmdlets referenced in this documentation are for managing legacy Azure resources that use Azure Service Manager (ASM) APIs. This legacy PowerShell module isn't recommended for creating new resources since ASM is scheduled for retirement.
56
+
57
+
Step 2: Run the following command to remove the application gateway.
Post your issues and questions about migration to our [Microsoft Q&A page](/answers/topics/azure-virtual-network.html). We recommend posting all your questions on this forum. If you have a support contract, you're welcome to log a support ticket as well.
51
76
52
77
## Next steps
53
-
To get started see: [platform-supported migration of IaaS resources from classic to Resource Manager](/azure/virtual-machines/migration-classic-resource-manager-ps)
78
+
To get started, see: [platform-supported migration of IaaS resources from classic to Resource Manager](/azure/virtual-machines/migration-classic-resource-manager-ps)
54
79
55
-
For any concerns around migration, you can contact Azure Support. Learn more about [Azure support here](https://azure.microsoft.com/support/options/).
80
+
For any concerns around migration, you can contact Azure Support. Learn more about [Azure support here](https://azure.microsoft.com/support/options/).
Copy file name to clipboardExpand all lines: articles/firewall/protect-azure-kubernetes-service.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ However, in a production environment, communications with a Kubernetes cluster s
26
26
27
27
The simplest solution uses a firewall device that can control outbound traffic based on domain names. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. Azure Firewall, for example, can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination, giving you fine-grained egress traffic control, but at the same time allows you to provide access to the FQDNs encompassing an AKS cluster’s outbound dependencies (something that NSGs can't do). Likewise, you can control ingress traffic and improve security by enabling threat intelligence-based filtering on an Azure Firewall deployed to a shared perimeter network. This filtering can provide alerts, and deny traffic to and from known malicious IP addresses and domains.
28
28
29
-
See the following video by Abhinav Sriram for a quick overview on how this works in practice on a sample environment:
29
+
See the following video for a quick overview on how this works in practice on a sample environment:
0 commit comments