You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/migrate-stv1-to-stv2-vnet.md
+33-26Lines changed: 33 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
ms.service: api-management
7
7
ms.custom:
8
8
ms.topic: how-to
9
-
ms.date: 05/15/2024
9
+
ms.date: 06/18/2024
10
10
ms.author: danlep
11
11
---
12
12
@@ -38,7 +38,7 @@ API Management platform migration from `stv1` to `stv2` involves updating the un
38
38
* For an instance in internal VNet mode, customer manages the DNS, so the DNS entries continue to point to old compute until updated by the customer.
39
39
* It's the DNS that points to either the new or the old compute and hence no downtime to the APIs.
40
40
* Changes are required to your firewall rules, if any, to allow the new compute subnet to reach the backends.
41
-
* After successful migration, the old compute is automatically decommissioned after approximately 15 minutes by default, with an option to delay it for up to 48 hours. *The 48 hour delay option is only available for VNet-injected services.*
41
+
* After successful migration, the old compute is automatically decommissioned after approximately 15 minutes by default. You can enable a migration setting to retain the old gateway for 48 hours. *The 48 hour delay option is only available for VNet-injected services.*
42
42
43
43
## Prerequisites
44
44
@@ -50,12 +50,6 @@ API Management platform migration from `stv1` to `stv2` involves updating the un
* (Optional) Contact Azure support to request that the original service infrastructure is maintained in parallel for up to 48 hours after successful migration. This option extends the period when the old infrastructure is available after migration beyond the default of 15 minutes before it is purged. This option is available only for VNet-injected services to allow service owners to update network settings and test applications to use the new infrastructure. This extension request applies to all API Management instances in a subscription.
54
-
55
-
> [!NOTE]
56
-
> If you plan to migrate your VNet-injected API Management instance back to the original subnet after migration, we recommend that you don't request the 48-hour extension.
57
-
58
-
59
53
## Trigger migration of a network-injected API Management instance
60
54
61
55
Trigger migration of a network-injected API Management instance to the `stv2` platform by updating the existing network configuration to use new network settings in each region where the instance is deployed. After that update completes, as an optional step, you can migrate back to the original VNets and subnets you used.
@@ -67,20 +61,31 @@ You can also migrate to the `stv2` platform by enabling [zone redundancy](../rel
67
61
68
62
### Update network configuration
69
63
70
-
You can use the Azure portal or other Azure tools such to migrate to a new subnet in the same or a different VNet. The following image shows a high level overview of what happens during migration to a new subnet.
64
+
You can use the Azure portal to migrate to a new subnet in the same or a different VNet. The following image shows a high level overview of what happens during migration to a new subnet.
71
65
72
66
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/inplace-new-subnet.gif" alt-text="Diagram of in-place migration to a new subnet.":::
73
67
74
-
For example, to use the portal:
68
+
#### [Portal](#tab/portal)
75
69
76
-
1. In the [portal](https://portal.azure.com), navigate to your API Management instance.
77
-
1. In the left menu, select **Network** > **Virtual network**.
78
-
1. Select the network connection in the location you want to update.
79
-
1. Select the virtual network and subnet you want to configure. Optionally select a new public IP. Select **Apply**.
80
-
1. Continue configuring VNet settings for the remaining locations of your API Management instance.
81
-
1. In the top navigation bar, select **Save**.
70
+
1. In the [Azure portal](https://portal.azure.com), navigate to your API Management instance.
71
+
1. In the left menu, under **Settings**, select **Platform migration**.
72
+
1. On the **Platform migration** page, in **Step 1**, review migration requirements and prerequisites.
73
+
1. In **Step 2**, choose migration settings:
74
+
* Select a location to migrate.
75
+
* Select the **Virtual network**, **Subnet**, and optional **Public IP address** you want to migrate to.
76
+
77
+
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/select-location.png" alt-text="Screenshot of selecting network migration settings in the portal." lightbox="media/migrate-stv1-to-stv2-vnet/select-location.png":::
82
78
83
-
After you update the VNet configuration, the status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
79
+
* Select either **Return to original subnet as soon as possible** or **Stay in the new subnet and keep stv1 compute around for 48 hours** after migration. If you choose the former, the `stv1` compute will be deleted approximately 15 minutes after migration, allowing you to proceed directly with migration back to the original subnet if desired. If you choose the latter, the `stv1` compute is retained for 48 hours. You can use this period to validate your network settings and connectivity.
80
+
81
+
:::image type="content" source="media/migrate-stv1-to-stv2-vnet/enable-retain-gateway-small.png" alt-text="Screenshot of options to retain stv1 compute in the portal." lightbox="media/migrate-stv1-to-stv2-vnet/enable-retain-gateway.png":::
82
+
83
+
1. In **Step 3**, confirm you want to migrate, and select **Migrate**.
84
+
The status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
85
+
86
+
If your API Management instance is deployed in multiple regions, repeat the preceding steps to continue migrating VNet settings for the remaining locations of your instance.
87
+
88
+
---
84
89
85
90
## (Optional) Migrate back to original subnet
86
91
@@ -93,8 +98,6 @@ The following image shows a high level overview of what happens during migration
93
98
> [!IMPORTANT]
94
99
> If the VNet and subnet are locked (because other `stv1` platform-based API Management instances are deployed there) or the resource group where the original VNet is deployed has a [resource lock](../azure-resource-manager/management/lock-resources.md), make sure to remove the lock before migrating back to the original subnet. Wait for lock removal to complete before attempting the migration to the original subnet. [Learn more](api-management-using-with-internal-vnet.md#challenges-encountered-in-reassigning-api-management-instance-to-previous-subnet).
95
100
96
-
> [!NOTE]
97
-
> If you plan to migrate back to the original subnet, we recommend that you don't request the 48-hour extension on your subscription for maintaining the old infrastructure; otherwise, your migration will be delayed. If you need to cancel an extension, contact Azure support.
98
101
99
102
### Additional prerequisites
100
103
@@ -109,7 +112,11 @@ The following image shows a high level overview of what happens during migration
109
112
1. In the [portal](https://portal.azure.com), navigate to your original VNet.
110
113
1. In the left menu, select **Subnets**, and then the original subnet.
111
114
1. Verify that the original IP addresses were released by API Management. Under **Available IPs**, note the number of IP addresses available in the subnet. All addresses (except for Azure reserved addresses) should be available. If necessary, wait for IP addresses to be released.
112
-
1. Repeat the migration steps in the [preceding section](#trigger-migration-of-a-network-injected-api-management-instance). In each region, specify the original VNet and subnet. Optionally select a new public IP.
115
+
1. Navigate to your API Management instance.
116
+
1. In the left menu, under **Network**, select **Virtual network**.
117
+
1. Select the network connection in the location you want to update.
118
+
1. Select the original VNet network and subnet. Optionally select a new public IP. Select **Apply**.
119
+
1. If your API Management instance is deployed in multiple regions, continue configuring VNet settings for the remaining locations of your instance.
113
120
1. In the top navigation bar, select **Save**.
114
121
115
122
After you update the VNet configuration, the status of your API Management instance changes to **Updating**. The migration process takes approximately 45 minutes to complete. When the status changes to **Online**, migration is complete.
@@ -141,7 +148,7 @@ After you update the VNet configuration, the status of your API Management insta
141
148
142
149
-**Will the migration cause a downtime?**
143
150
144
-
Since the old gateway is purged only after the new compute is healthy and online, there shouldn't be any downtime if default hostnames are in use. It's critical that all network dependencies are taken care of upfront, for the impacted APIs to be functional. However, if custom domains are in use, they'll be pointing to the purged compute until they're updated which may cause a downtime. Alternatively, you can request for the old gateway to be retained for up to 48 hours by creating an Azure support ticket in advance. Having the old and the new compute coexist will facilitate validation, and then you can update the custom DNS entries at will.
151
+
Since the old gateway is purged only after the new compute is healthy and online, there shouldn't be any downtime if default hostnames are in use. It's critical that all network dependencies are taken care of upfront, for the impacted APIs to be functional. However, if custom domains are in use, they'll be pointing to the purged compute until they're updated which may cause a downtime. Alternatively, enable a migration setting to retain the old gateway for 48 hours. Having the old and the new compute coexist will facilitate validation, and then you can update the custom DNS entries at will.
145
152
146
153
147
154
-**My traffic is force tunneled through a firewall. What changes are required?**
@@ -158,11 +165,11 @@ After you update the VNet configuration, the status of your API Management insta
158
165
159
166
-**How to confirm that the migration is complete and successful?**
160
167
161
-
The migration is considered complete and successful when the status in the overview page reads **Online** along with the platform version being either `stv2` or `stv2.1`. Also verify that the network status in the network blade shows green for all required connectivity.
168
+
The migration is considered complete and successful when the status in the **Overview** page reads **Online** along with the platform version being either `stv2` or `stv2.1`. Also verify that the network status in the **Network** blade shows green for all required connectivity.
162
169
163
170
-**Can I do the migration using the portal?**
164
171
165
-
Yes, VNet-injected instances can be migrated by changing the subnet configuration(s) in the **Network** blade.
172
+
Yes, VNet-injected instances can be migrated by changing the subnet configuration(s) in the **Platform migration** blade.
166
173
167
174
-**Can I preserve the IP address of the instance?**
168
175
@@ -201,19 +208,19 @@ After you update the VNet configuration, the status of your API Management insta
201
208
202
209
-**My stv1 instance is deployed to multiple Azure regions (multi-region). How do I upgrade to stv2?**
203
210
204
-
Multi-region deployments include more managed gateways deployed in other locations. Each location should be migrated separately by providing a new subnet and a new public IP (required when enabling zone redundancy). Navigate to the **Locations** blade and perform the changes on each listed location. The instance is considered migrated to the new platform only when all the locations are migrated. All regional gateways continue to operate normally throughout the migration process.
211
+
Multi-region deployments include more managed gateways deployed in other locations. Migrate each location separately by updating the corresponding network settings - for example, using the **Platform migration** blade. The instance is considered migrated to the new platform only when all the locations are migrated. All regional gateways continue to operate normally throughout the migration process.
205
212
206
213
207
214
-**Can I upgrade my stv1 instance to the same subnet?**
208
215
209
216
- You can't migrate the `stv1` instance to the same subnet in a single pass without downtime. However, you can optionally move your migrated instance back to the original subnet. More details [here](#optional-migrate-back-to-original-subnet).
210
-
- The old gateway takes between 15 mins to 45 mins to vacate the subnet, so that you can initiate the move. However, you can request to increase this time to up to 48 hours by a support ticket.
217
+
- The old gateway takes between 15 mins to 45 mins to vacate the subnet, so that you can initiate the move. However, you can enable a migration setting to retain the old gateway for 48 hours.
211
218
- Ensure that the old subnet's networking for [NSG](./api-management-using-with-internal-vnet.md?tabs=stv2#configure-nsg-rules) and [firewall](./api-management-using-with-vnet.md?tabs=stv2#force-tunnel-traffic-to-on-premises-firewall-using-expressroute-or-network-virtual-appliance) is updated for `stv2` dependencies.
212
219
- Subnet IP address allocation is nondeterministic, therefore the original ILB (ingress) IP for "internal mode" deployments may change when you move back to the original subnet. This would require a DNS change if you're using A records.
213
220
214
221
-**Can I test the new gateway before switching the live traffic?**
215
222
216
-
- By default, the old and the new managed gateways coexist for 15 mins, which is a small window of time to validate the deployment. You can request to increase this time to up to 48 hours through an Azure support ticket. This change keeps the old and the new managed gateways active to receive traffic and facilitate validation.
223
+
- By default, the old and the new managed gateways coexist for 15 mins, which is a small window of time to validate the deployment. You can enable a migration setting to retain the old gateway for 48 hours. This change keeps the old and the new managed gateways active to receive traffic and facilitate validation.
217
224
- The migration process automatically updates the default domain names, and if being used, the traffic routes to the new gateways immediately.
218
225
- If custom domain names are in use, the corresponding DNS records might need to be updated with the new IP address if not using CNAME. Customers can update their hosts file to the new API Management IP and validate the instance before making the switch. During this validation process, the old gateway continues to serve the live traffic.
Copy file name to clipboardExpand all lines: articles/api-management/migrate-stv1-to-stv2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ There are two different migration scenarios, depending on whether or not your AP
24
24
25
25
*[**Scenario 1: Migrate a non-VNet-injected API Management instance**](migrate-stv1-to-stv2-no-vnet.md) - Migrate your instance to the `stv2` platform using the portal or the [Migrate to stv2](/rest/api/apimanagement/current-ga/api-management-service/migratetostv2) REST API.
26
26
27
-
*[**Scenario 2: Migrate a VNet-injected API Management instance**](migrate-stv1-to-stv2-vnet.md) - Migrate your instance to the `stv2` platform by updating the VNet configuration settings
27
+
*[**Scenario 2: Migrate a VNet-injected API Management instance**](migrate-stv1-to-stv2-vnet.md) - Migrate your instance to the `stv2` platform by updating the VNet configuration settings using the portal.
Copy file name to clipboardExpand all lines: articles/azure-arc/multicloud-connector/onboard-multicloud-vms-arc.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ In addition to the [general prerequisites](connect-to-aws.md#prerequisites) for
24
24
- You must have **AmazonEC2FullAccess** permissions in your public cloud.
25
25
- EC2 instances must meet the [general prerequisites for installing the Connected Machine agent](../servers/prerequisites.md).
26
26
- EC2 instances must have the SSM agent installed. Most EC2 instances have this preconfigured.
27
-
- EC2 instances must have a tag with the key of `arc`(case-sensitive) and empty value. This tag can be assigned manually or via a policy.
27
+
- EC2 instances must have a tag with the key of `arc` and any value. This tag can be assigned manually or via a policy.
28
28
- The **ArcForServerSSMRole** IAM role [attached on each EC2 instance](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html#attach-iam-role). This role attachment must be done after you upload your Cloud Formation Template in the Connector creation steps.
29
29
30
30
## AWS resource representation in Azure
@@ -48,4 +48,4 @@ If you prefer, you can turn periodic sync off when configuring this solution. If
48
48
## Next steps
49
49
50
50
- Learn more about [managing connected servers through Azure Arc](../servers/overview.md).
51
-
- Learn about the [Multicloud Connector **Inventory** solution](view-multicloud-inventory.md).
51
+
- Learn about the [Multicloud Connector **Inventory** solution](view-multicloud-inventory.md).
Copy file name to clipboardExpand all lines: articles/azure-maps/power-bi-visual-get-started.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,19 +12,20 @@ services: azure-maps
12
12
13
13
# Get started with Azure Maps Power BI visual
14
14
15
-
**APPLIES TO:** Power BI service for ***consumers*** Power BI service for designers & developers  Power BI Desktop  Requires Pro or Premium license
16
-
17
15
This article shows how to use the Microsoft Azure Maps Power BI visual.
18
16
19
-
> [!NOTE]
20
-
> Power BI does not share the name of customer or end user who sends the above details or locations to Azure Maps.
17
+
**APPLIES TO:** Power BI service for ***consumers*** Power BI service for designers & developers  Power BI Desktop  Requires Pro or Premium license
18
+
21
19
> [!NOTE]
22
20
> This visual can be created and viewed in both Power BI Desktop and the Power BI service. The steps and illustrations in this article are from Power BI Desktop.
23
21
24
22
The Azure Maps Power BI visual provides a rich set of data visualizations for spatial data on top of a map. It's estimated that over 80% of business data has a location context. The Azure Maps Power BI visual can be used to gain insights into how this location context relates to and influences your business data.
25
23
26
24
:::image type="content" source="media/power-bi-visual/azure-maps-visual-hero.png" alt-text="A screenshot of Power BI desktop with the Azure Maps Power BI visual displaying business data." lightbox="media/power-bi-visual/azure-maps-visual-hero.png":::
27
25
26
+
> [!NOTE]
27
+
> Power BI ensures that no Personal Identifiable Information (PII) is sent to Azure Maps. Additionally, IP addresses are truncated in the Power BI diagnostic logs.
28
+
28
29
## What is sent to Azure?
29
30
30
31
The Azure Maps Power BI visual connects to cloud service hosted in Azure to retrieve location data such as map images and coordinates that are used to create the map visualization.
@@ -35,16 +36,16 @@ The Azure Maps Power BI visual connects to cloud service hosted in Azure to retr
35
36
36
37
Other than the scenarios previously described, no other data overlaid on the map is sent to the Azure Maps servers. All rendering of data happens locally within the client.
37
38
38
-
> [!NOTE]
39
-
> Power BI does not share the name of customer or end user who sends the above details or locations to Azure Maps.
40
-
41
39
> [!TIP]
42
40
> If using the Azure Maps [Geographic API endpoints], your firewall may need to be updated to allow access to the Azure Maps platform using either or all of the following URLs:
43
41
>
44
42
> -`https://atlas.microsoft.com`
45
43
> -`https://us.atlas.microsoft.com`
46
44
> -`https://eu.atlas.microsoft.com`
47
45
46
+
> [!IMPORTANT]
47
+
> The selection tool within the Azure Maps Power BI visual relies on TomTom data, consequently user data may not always remain within the user’s geographical boundary.
48
+
48
49
For more information about privacy and terms of use related to the Azure Maps Power BI visual, see [Microsoft Azure Legal Information].
0 commit comments