Skip to content

Commit 5120dac

Browse files
authored
Merge pull request #278642 from MicrosoftDocs/main
6/19 11:00 AM IST Publish
2 parents 609e7ac + 0b1d5fb commit 5120dac

File tree

43 files changed

+707
-621
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+707
-621
lines changed
59.1 KB
Loading
130 KB
Loading
51.6 KB
Loading

articles/api-management/migrate-stv1-to-stv2-vnet.md

Lines changed: 33 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66
ms.service: api-management
77
ms.custom:
88
ms.topic: how-to
9-
ms.date: 05/15/2024
9+
ms.date: 06/18/2024
1010
ms.author: danlep
1111
---
1212

@@ -38,7 +38,7 @@ API Management platform migration from `stv1` to `stv2` involves updating the un
3838
* For an instance in internal VNet mode, customer manages the DNS, so the DNS entries continue to point to old compute until updated by the customer.
3939
* It's the DNS that points to either the new or the old compute and hence no downtime to the APIs.
4040
* Changes are required to your firewall rules, if any, to allow the new compute subnet to reach the backends.
41-
* After successful migration, the old compute is automatically decommissioned after approximately 15 minutes by default, with an option to delay it for up to 48 hours. *The 48 hour delay option is only available for VNet-injected services.*
41+
* After successful migration, the old compute is automatically decommissioned after approximately 15 minutes by default. You can enable a migration setting to retain the old gateway for 48 hours. *The 48 hour delay option is only available for VNet-injected services.*
4242

4343
## Prerequisites
4444

@@ -50,12 +50,6 @@ API Management platform migration from `stv1` to `stv2` involves updating the un
5050

5151
[!INCLUDE [api-management-publicip-internal-vnet](../../includes/api-management-publicip-internal-vnet.md)]
5252

53-
* (Optional) Contact Azure support to request that the original service infrastructure is maintained in parallel for up to 48 hours after successful migration. This option extends the period when the old infrastructure is available after migration beyond the default of 15 minutes before it is purged. This option is available only for VNet-injected services to allow service owners to update network settings and test applications to use the new infrastructure. This extension request applies to all API Management instances in a subscription.
54-
55-
> [!NOTE]
56-
> If you plan to migrate your VNet-injected API Management instance back to the original subnet after migration, we recommend that you don't request the 48-hour extension.
57-
58-
5953
## Trigger migration of a network-injected API Management instance
6054

6155
Trigger migration of a network-injected API Management instance to the `stv2` platform by updating the existing network configuration to use new network settings in each region where the instance is deployed. After that update completes, as an optional step, you can migrate back to the original VNets and subnets you used.
@@ -67,20 +61,31 @@ You can also migrate to the `stv2` platform by enabling [zone redundancy](../rel
6761
6862
### Update network configuration
6963

70-
You can use the Azure portal or other Azure tools such to migrate to a new subnet in the same or a different VNet. The following image shows a high level overview of what happens during migration to a new subnet.
64+
You can use the Azure portal to migrate to a new subnet in the same or a different VNet. The following image shows a high level overview of what happens during migration to a new subnet.
7165

7266
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/inplace-new-subnet.gif" alt-text="Diagram of in-place migration to a new subnet.":::
7367

74-
For example, to use the portal:
68+
#### [Portal](#tab/portal)
7569

76-
1. In the [portal](https://portal.azure.com), navigate to your API Management instance.
77-
1. In the left menu, select **Network** > **Virtual network**.
78-
1. Select the network connection in the location you want to update.
79-
1. Select the virtual network and subnet you want to configure. Optionally select a new public IP. Select **Apply**.
80-
1. Continue configuring VNet settings for the remaining locations of your API Management instance.
81-
1. In the top navigation bar, select **Save**.
70+
1. In the [Azure portal](https://portal.azure.com), navigate to your API Management instance.
71+
1. In the left menu, under **Settings**, select **Platform migration**.
72+
1. On the **Platform migration** page, in **Step 1**, review migration requirements and prerequisites.
73+
1. In **Step 2**, choose migration settings:
74+
* Select a location to migrate.
75+
* Select the **Virtual network**, **Subnet**, and optional **Public IP address** you want to migrate to.
76+
77+
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/select-location.png" alt-text="Screenshot of selecting network migration settings in the portal." lightbox="media/migrate-stv1-to-stv2-vnet/select-location.png":::
8278

83-
After you update the VNet configuration, the status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
79+
* Select either **Return to original subnet as soon as possible** or **Stay in the new subnet and keep stv1 compute around for 48 hours** after migration. If you choose the former, the `stv1` compute will be deleted approximately 15 minutes after migration, allowing you to proceed directly with migration back to the original subnet if desired. If you choose the latter, the `stv1` compute is retained for 48 hours. You can use this period to validate your network settings and connectivity.
80+
81+
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/enable-retain-gateway-small.png" alt-text="Screenshot of options to retain stv1 compute in the portal." lightbox="media/migrate-stv1-to-stv2-vnet/enable-retain-gateway.png":::
82+
83+
1. In **Step 3**, confirm you want to migrate, and select **Migrate**.
84+
The status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
85+
86+
If your API Management instance is deployed in multiple regions, repeat the preceding steps to continue migrating VNet settings for the remaining locations of your instance.
87+
88+
---
8489

8590
## (Optional) Migrate back to original subnet
8691

@@ -93,8 +98,6 @@ The following image shows a high level overview of what happens during migration
9398
> [!IMPORTANT]
9499
> If the VNet and subnet are locked (because other `stv1` platform-based API Management instances are deployed there) or the resource group where the original VNet is deployed has a [resource lock](../azure-resource-manager/management/lock-resources.md), make sure to remove the lock before migrating back to the original subnet. Wait for lock removal to complete before attempting the migration to the original subnet. [Learn more](api-management-using-with-internal-vnet.md#challenges-encountered-in-reassigning-api-management-instance-to-previous-subnet).
95100
96-
> [!NOTE]
97-
> If you plan to migrate back to the original subnet, we recommend that you don't request the 48-hour extension on your subscription for maintaining the old infrastructure; otherwise, your migration will be delayed. If you need to cancel an extension, contact Azure support.
98101

99102
### Additional prerequisites
100103

@@ -109,7 +112,11 @@ The following image shows a high level overview of what happens during migration
109112
1. In the [portal](https://portal.azure.com), navigate to your original VNet.
110113
1. In the left menu, select **Subnets**, and then the original subnet.
111114
1. Verify that the original IP addresses were released by API Management. Under **Available IPs**, note the number of IP addresses available in the subnet. All addresses (except for Azure reserved addresses) should be available. If necessary, wait for IP addresses to be released.
112-
1. Repeat the migration steps in the [preceding section](#trigger-migration-of-a-network-injected-api-management-instance). In each region, specify the original VNet and subnet. Optionally select a new public IP.
115+
1. Navigate to your API Management instance.
116+
1. In the left menu, under **Network**, select **Virtual network**.
117+
1. Select the network connection in the location you want to update.
118+
1. Select the original VNet network and subnet. Optionally select a new public IP. Select **Apply**.
119+
1. If your API Management instance is deployed in multiple regions, continue configuring VNet settings for the remaining locations of your instance.
113120
1. In the top navigation bar, select **Save**.
114121

115122
After you update the VNet configuration, the status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
@@ -141,7 +148,7 @@ After you update the VNet configuration, the status of your API Management insta
141148

142149
- **Will the migration cause a downtime?**
143150

144-
Since the old gateway is purged only after the new compute is healthy and online, there shouldn't be any downtime if default hostnames are in use. It's critical that all network dependencies are taken care of upfront, for the impacted APIs to be functional. However, if custom domains are in use, they'll be pointing to the purged compute until they're updated which may cause a downtime. Alternatively, you can request for the old gateway to be retained for up to 48 hours by creating an Azure support ticket in advance. Having the old and the new compute coexist will facilitate validation, and then you can update the custom DNS entries at will.
151+
Since the old gateway is purged only after the new compute is healthy and online, there shouldn't be any downtime if default hostnames are in use. It's critical that all network dependencies are taken care of upfront, for the impacted APIs to be functional. However, if custom domains are in use, they'll be pointing to the purged compute until they're updated which may cause a downtime. Alternatively, enable a migration setting to retain the old gateway for 48 hours. Having the old and the new compute coexist will facilitate validation, and then you can update the custom DNS entries at will.
145152

146153

147154
- **My traffic is force tunneled through a firewall. What changes are required?**
@@ -158,11 +165,11 @@ After you update the VNet configuration, the status of your API Management insta
158165

159166
- **How to confirm that the migration is complete and successful?**
160167

161-
The migration is considered complete and successful when the status in the overview page reads **Online** along with the platform version being either `stv2` or `stv2.1`. Also verify that the network status in the network blade shows green for all required connectivity.
168+
The migration is considered complete and successful when the status in the **Overview** page reads **Online** along with the platform version being either `stv2` or `stv2.1`. Also verify that the network status in the **Network** blade shows green for all required connectivity.
162169

163170
- **Can I do the migration using the portal?**
164171

165-
Yes, VNet-injected instances can be migrated by changing the subnet configuration(s) in the **Network** blade.
172+
Yes, VNet-injected instances can be migrated by changing the subnet configuration(s) in the **Platform migration** blade.
166173

167174
- **Can I preserve the IP address of the instance?**
168175

@@ -201,19 +208,19 @@ After you update the VNet configuration, the status of your API Management insta
201208

202209
- **My stv1 instance is deployed to multiple Azure regions (multi-region). How do I upgrade to stv2?**
203210

204-
Multi-region deployments include more managed gateways deployed in other locations. Each location should be migrated separately by providing a new subnet and a new public IP (required when enabling zone redundancy). Navigate to the **Locations** blade and perform the changes on each listed location. The instance is considered migrated to the new platform only when all the locations are migrated. All regional gateways continue to operate normally throughout the migration process.
211+
Multi-region deployments include more managed gateways deployed in other locations. Migrate each location separately by updating the corresponding network settings - for example, using the **Platform migration** blade. The instance is considered migrated to the new platform only when all the locations are migrated. All regional gateways continue to operate normally throughout the migration process.
205212

206213

207214
- **Can I upgrade my stv1 instance to the same subnet?**
208215

209216
- You can't migrate the `stv1` instance to the same subnet in a single pass without downtime. However, you can optionally move your migrated instance back to the original subnet. More details [here](#optional-migrate-back-to-original-subnet).
210-
- The old gateway takes between 15 mins to 45 mins to vacate the subnet, so that you can initiate the move. However, you can request to increase this time to up to 48 hours by a support ticket.
217+
- The old gateway takes between 15 mins to 45 mins to vacate the subnet, so that you can initiate the move. However, you can enable a migration setting to retain the old gateway for 48 hours.
211218
- Ensure that the old subnet's networking for [NSG](./api-management-using-with-internal-vnet.md?tabs=stv2#configure-nsg-rules) and [firewall](./api-management-using-with-vnet.md?tabs=stv2#force-tunnel-traffic-to-on-premises-firewall-using-expressroute-or-network-virtual-appliance) is updated for `stv2` dependencies.
212219
- Subnet IP address allocation is nondeterministic, therefore the original ILB (ingress) IP for "internal mode" deployments may change when you move back to the original subnet. This would require a DNS change if you're using A records.
213220

214221
- **Can I test the new gateway before switching the live traffic?**
215222

216-
- By default, the old and the new managed gateways coexist for 15 mins, which is a small window of time to validate the deployment. You can request to increase this time to up to 48 hours through an Azure support ticket. This change keeps the old and the new managed gateways active to receive traffic and facilitate validation.
223+
- By default, the old and the new managed gateways coexist for 15 mins, which is a small window of time to validate the deployment. You can enable a migration setting to retain the old gateway for 48 hours. This change keeps the old and the new managed gateways active to receive traffic and facilitate validation.
217224
- The migration process automatically updates the default domain names, and if being used, the traffic routes to the new gateways immediately.
218225
- If custom domain names are in use, the corresponding DNS records might need to be updated with the new IP address if not using CNAME. Customers can update their hosts file to the new API Management IP and validate the instance before making the switch. During this validation process, the old gateway continues to serve the live traffic.
219226

articles/api-management/migrate-stv1-to-stv2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ There are two different migration scenarios, depending on whether or not your AP
2424

2525
* [**Scenario 1: Migrate a non-VNet-injected API Management instance**](migrate-stv1-to-stv2-no-vnet.md) - Migrate your instance to the `stv2` platform using the portal or the [Migrate to stv2](/rest/api/apimanagement/current-ga/api-management-service/migratetostv2) REST API.
2626

27-
* [**Scenario 2: Migrate a VNet-injected API Management instance**](migrate-stv1-to-stv2-vnet.md) - Migrate your instance to the `stv2` platform by updating the VNet configuration settings
27+
* [**Scenario 2: Migrate a VNet-injected API Management instance**](migrate-stv1-to-stv2-vnet.md) - Migrate your instance to the `stv2` platform by updating the VNet configuration settings using the portal.
2828

2929
## Alternative: Side-by-side deployment
3030

articles/azure-arc/multicloud-connector/onboard-multicloud-vms-arc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In addition to the [general prerequisites](connect-to-aws.md#prerequisites) for
2424
- You must have **AmazonEC2FullAccess** permissions in your public cloud.
2525
- EC2 instances must meet the [general prerequisites for installing the Connected Machine agent](../servers/prerequisites.md).
2626
- EC2 instances must have the SSM agent installed. Most EC2 instances have this preconfigured.
27-
- EC2 instances must have a tag with the key of `arc` (case-sensitive) and empty value. This tag can be assigned manually or via a policy.
27+
- EC2 instances must have a tag with the key of `arc` and any value. This tag can be assigned manually or via a policy.
2828
- The **ArcForServerSSMRole** IAM role [attached on each EC2 instance](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html#attach-iam-role). This role attachment must be done after you upload your Cloud Formation Template in the Connector creation steps.
2929

3030
## AWS resource representation in Azure
@@ -48,4 +48,4 @@ If you prefer, you can turn periodic sync off when configuring this solution. If
4848
## Next steps
4949

5050
- Learn more about [managing connected servers through Azure Arc](../servers/overview.md).
51-
- Learn about the [Multicloud Connector **Inventory** solution](view-multicloud-inventory.md).
51+
- Learn about the [Multicloud Connector **Inventory** solution](view-multicloud-inventory.md).

articles/azure-maps/power-bi-visual-get-started.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,20 @@ services: azure-maps
1212

1313
# Get started with Azure Maps Power BI visual
1414

15-
**APPLIES TO:** ![Green check mark.](media/power-bi-visual/yes.png) Power BI service for ***consumers*** ![Green check mark.](media/power-bi-visual/yes.png) Power BI service for designers & developers ![Green check mark.](media/power-bi-visual/yes.png) Power BI Desktop ![X indicating no.](media/power-bi-visual/no.png) Requires Pro or Premium license
16-
1715
This article shows how to use the Microsoft Azure Maps Power BI visual.
1816

19-
> [!NOTE]
20-
> Power BI does not share the name of customer or end user who sends the above details or locations to Azure Maps.
17+
**APPLIES TO:** ![Green check mark.](media/power-bi-visual/yes.png) Power BI service for ***consumers*** ![Green check mark.](media/power-bi-visual/yes.png) Power BI service for designers & developers ![Green check mark.](media/power-bi-visual/yes.png) Power BI Desktop ![X indicating no.](media/power-bi-visual/no.png) Requires Pro or Premium license
18+
2119
> [!NOTE]
2220
> This visual can be created and viewed in both Power BI Desktop and the Power BI service. The steps and illustrations in this article are from Power BI Desktop.
2321
2422
The Azure Maps Power BI visual provides a rich set of data visualizations for spatial data on top of a map. It's estimated that over 80% of business data has a location context. The Azure Maps Power BI visual can be used to gain insights into how this location context relates to and influences your business data.
2523

2624
:::image type="content" source="media/power-bi-visual/azure-maps-visual-hero.png" alt-text="A screenshot of Power BI desktop with the Azure Maps Power BI visual displaying business data." lightbox="media/power-bi-visual/azure-maps-visual-hero.png":::
2725

26+
> [!NOTE]
27+
> Power BI ensures that no Personal Identifiable Information (PII) is sent to Azure Maps. Additionally, IP addresses are truncated in the Power BI diagnostic logs.
28+
2829
## What is sent to Azure?
2930

3031
The Azure Maps Power BI visual connects to cloud service hosted in Azure to retrieve location data such as map images and coordinates that are used to create the map visualization.
@@ -35,16 +36,16 @@ The Azure Maps Power BI visual connects to cloud service hosted in Azure to retr
3536

3637
Other than the scenarios previously described, no other data overlaid on the map is sent to the Azure Maps servers. All rendering of data happens locally within the client.
3738

38-
> [!NOTE]
39-
> Power BI does not share the name of customer or end user who sends the above details or locations to Azure Maps.
40-
4139
> [!TIP]
4240
> If using the Azure Maps [Geographic API endpoints], your firewall may need to be updated to allow access to the Azure Maps platform using either or all of the following URLs:
4341
>
4442
> - `https://atlas.microsoft.com`
4543
> - `https://us.atlas.microsoft.com`
4644
> - `https://eu.atlas.microsoft.com`
4745
46+
> [!IMPORTANT]
47+
> The selection tool within the Azure Maps Power BI visual relies on TomTom data, consequently user data may not always remain within the user’s geographical boundary.
48+
4849
For more information about privacy and terms of use related to the Azure Maps Power BI visual, see [Microsoft Azure Legal Information].
4950

5051
## Use the Azure Maps Power BI visual

0 commit comments

Comments
 (0)