Skip to content

Commit 5604dbd

Browse files
Merge pull request #241870 from MJyot/v1-migration
V1 migration
2 parents d64fec6 + a4a9f6f commit 5604dbd

File tree

2 files changed

+33
-8
lines changed

2 files changed

+33
-8
lines changed

articles/application-gateway/migrate-v1-v2.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,31 @@ To run the script:
107107
```
108108
109109
You can pass in `$mySslCert1, $mySslCert2` (comma-separated) in the previous example as values for this parameter in the script.
110+
111+
* **sslCertificates from Keyvault: Optional**.You can download the certificates stored in Azure Key Vault and pass it to migration script.To download the certificate as a PFX file, run following command. These commands access SecretId, and then save the content as a PFX file.
112+
113+
```azurepowershell
114+
$vaultName = <kv-name>
115+
$certificateName = <cert-name>
116+
$password = <password>
117+
118+
$pfxSecret = Get-AzKeyVaultSecret -VaultName $vaultName -Name $certificateName -AsPlainText
119+
$secretByte = [Convert]::FromBase64String($pfxSecret)
120+
$x509Cert = New-Object Security.Cryptography.X509Certificates.X509Certificate2
121+
$x509Cert.Import($secretByte, $null, [Security.Cryptography.X509Certificates.X509KeyStorageFlags]::Exportable)
122+
$pfxFileByte = $x509Cert.Export([Security.Cryptography.X509Certificates.X509ContentType]::Pkcs12, $password)
123+
124+
# Write to a file
125+
[IO.File]::WriteAllBytes("KeyVaultcertificate.pfx", $pfxFileByte)
126+
```
127+
For each of the cert downloaded from the Keyvault, you can create a new PSApplicationGatewaySslCertificate object via the New-AzApplicationGatewaySslCertificate command shown here. You need the path to your TLS/SSL Cert file and the password.
128+
129+
```azurepowershell
130+
//Convert the downloaded certificate to SSL object
131+
$password = ConvertTo-SecureString <password> -AsPlainText -Force
132+
$cert = New-AzApplicationGatewaySSLCertificate -Name <certname> -CertificateFile <Cert-File-Path-1> -Password $password
133+
```
134+
110135
* **trustedRootCertificates: [PSApplicationGatewayTrustedRootCertificate]: Optional**. A comma-separated list of PSApplicationGatewayTrustedRootCertificate objects that you create to represent the [Trusted Root certificates](ssl-overview.md) for authentication of your backend instances from your v2 gateway.
111136
112137
```azurepowershell

articles/application-gateway/retirement-faq.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,15 +16,15 @@ On April 28,2023 we announced retirement of Application gateway V1 on 28 April 2
1616

1717
### What is the official date Application Gateway V1 is cut off from creation?
1818

19-
New Customers are not allowed to create v1 from 1 July 2023. However, any existing V1 customers can continue to create resources until August 2024 and manage V1 resources until the retirement date of 28 April 2026.
19+
New Customers aren't allowed to create v1 from 1 July 2023. However, any existing V1 customers can continue to create resources until August 2024 and manage V1 resources until the retirement date of 28 April 2026.
2020

2121
### What happens to existing Application Gateway V1 after 28 April 2026?
2222

23-
Once the deadline arrives V1 gateways are not supported. Any V1 SKU resources that are still active are stopped, and force deleted.
23+
Once the deadline arrives V1 gateways aren't supported. Any V1 SKU resources that are still active are stopped, and force deleted.
2424

2525
### What is the definition of a new customer on Application Gateway V1 SKU?
2626

27-
Customers who did not have Application Gateway V1 SKU in their subscriptions in the month of June 2023 are considered as new customers. These customers won’t be able to create new V1 gateways from 1 July 2023.
27+
Customers who didn't have Application Gateway V1 SKU in their subscriptions in the month of June 2023 are considered as new customers. These customers won’t be able to create new V1 gateways from 1 July 2023.
2828

2929
### What is the definition of an existing customer on Application Gateway V1 SKU?
3030

@@ -46,8 +46,8 @@ If you have an Application Gateway V1, [Migration from v1 to v2](./migrate-v1-v2
4646

4747
### Can Microsoft migrate this data for me?
4848

49-
No, Microsoft cannot migrate user's data on their behalf. Users must do the migration themselves by using the self-serve options provided.
50-
Application Gateway v1 is built on legacy components and customers have deployed the gateways in many different ways in their architecture ,due to which customer involvement is required for migration.This also allows users to plan the migration during a maintenance window, which can help to ensure that the migration is successful with minimal downtime for the user's applications.
49+
No, Microsoft can't migrate user's data on their behalf. Users must do the migration themselves by using the self-serve options provided.
50+
Application Gateway v1 is built on legacy components and customers have deployed the gateways in many different ways in their architecture , due to which customer involvement is required for migration. This also allows users to plan the migration during a maintenance window, which can help to ensure that the migration is successful with minimal downtime for the user's applications.
5151

5252
### What is the time required for migration?
5353

@@ -73,15 +73,15 @@ No. The Azure PowerShell script only migrates the configuration. Actual traffic
7373

7474
### Is the new v2 gateway created by the Azure PowerShell script sized appropriately to handle all of the traffic that is currently served by my v1 gateway?
7575

76-
The Azure PowerShell script creates a new v2 gateway with an appropriate size to handle the traffic on your existing v1 gateway. Autoscaling is disabled by default, but you can enable AutoScaling when you run the script.
76+
The Azure PowerShell script creates a new v2 gateway with an appropriate size to handle the traffic on your existing v1 gateway. Auto-scaling is disabled by default, but you can enable Auto-Scaling when you run the script.
7777

7878
### I configured my v1 gateway to send logs to Azure storage. Does the script replicate this configuration for v2 as well?
7979

8080
No. The script doesn't replicate this configuration for v2. You must add the log configuration separately to the migrated v2 gateway.
8181

82-
### Does this script support certificates uploaded to Azure Key Vault ?
82+
### Does this script support certificate uploaded to Azure Key Vault?
8383

84-
No. Currently the script doesn't support certificates in Key Vault.
84+
Yes. You can download the certificate from Keyvault and provide it as input to the migration script .
8585

8686
### I ran into some issues with using this script. How can I get help?
8787

0 commit comments

Comments
 (0)