You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/migrate-v1-v2.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,8 +31,8 @@ This article primarily helps with the configuration migration. Client traffic mi
31
31
* An existing Application Gateway V1 Standard.
32
32
* Make sure you have the latest PowerShell modules, or you can use Azure Cloud Shell in the portal.
33
33
* If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
34
-
* Ensure that there is no existing Application gateway with the provided Appgw V2 Name and Resource group name in V1 subscription. This will rewrite the existing resources.
35
-
* If Public IP is provided ensure that its in succeeded state.If not provided and AppGwResourceGroupName is provided ensure that public IP resource with name AppGwV2Name-IP doesn’t exist in a resourcegroup with the name AppGwResourceGroupName in the V1 subscription.
34
+
* Ensure that there is no existing Application gateway with the provided AppGW V2 Name and Resource group name in V1 subscription. This will rewrite the existing resources.
35
+
* If Public IP is provided ensure that its in succeeded state.If not provided and AppGWResourceGroupName is provided ensure that public IP resource with name AppGWV2Name-IP doesn’t exist in a resourcegroup with the name AppGWResourceGroupName in the V1 subscription.
36
36
* Ensure that no other operation is planned on the V1 gateway or any of its associated resources during migration.
@@ -70,8 +70,7 @@ There are two options for you depending on your local PowerShell environment set
70
70
71
71
To determine if you have the Azure Az modules installed, run `Get-InstalledModule -Name az`. If you don't see any installed Az modules, then you can use the `Install-Script` method.
72
72
73
-
#### Install using the Install-Script method
74
-
73
+
#### Install using the Install-Script method (recommended)
75
74
To use this option, you must not have the Azure Az modules installed on your computer. If they're installed, the following command displays an error. You can either uninstall the Azure Az modules, or use the other option to download the script manually and run it.
76
75
77
76
Run the script with the following command to get the latest version:
@@ -114,11 +113,11 @@ To run the script:
114
113
4. Run `Get-Help AzureAppGWMigration.ps1` to examine the required parameters:
115
114
116
115
```
117
-
AzureAppGwMigration.ps1
116
+
AzureAppGWMigration.ps1
118
117
-resourceId <V1 application gateway Resource ID>
119
118
-subnetAddressRange <subnet space you want to use>
120
119
-appgwName <string to use to append>
121
-
-AppGwResourceGroupName <resource group name you want to use>
120
+
-AppGWResourceGroupName <resource group name you want to use>
122
121
-sslCertificates <comma-separated SSLCert objects as above>
123
122
-trustedRootCertificates <comma-separated Trusted Root Cert objects as above>
124
123
-privateIpAddress <private IP string>
@@ -140,9 +139,9 @@ To run the script:
140
139
141
140
* **subnetAddressRange: [String]: Required**: This parameter is the IP address space that you've allocated (or want to allocate) for a new subnet that contains your new V2 gateway. The address space must be specified in the CIDR notation. For example: 10.0.0.0/24. You don't need to create this subnet in advance but the CIDR needs to be part of the VNET address space. The script creates it for you if it doesn't exist and if it exists, it uses the existing one (make sure the subnet is either empty, contains only V2 Gateway if any, and has enough available IPs).
142
141
* **appgwName: [String]: Optional**. This is a string you specify to use as the name for the new Standard_V2 or WAF_V2 gateway. If this parameter isn't supplied, the name of your existing V1 gateway is used with the suffix *_V2* appended.
143
-
* **AppGwResourceGroupName: [String]: Optional**. Name of resource group where you want V2 Application Gateway resources to be created (default value is `<V1-app-gw-rgname>`)
142
+
* **AppGWResourceGroupName: [String]: Optional**. Name of resource group where you want V2 Application Gateway resources to be created (default value is `<V1-app-gw-rgname>`)
144
143
> [!NOTE]
145
-
> Ensure that there is no existing Application gateway with the provided Appgw V2 Name and Resource group name in V1 subscription. This will rewrite the existing resources.
144
+
> Ensure that there is no existing Application gateway with the provided AppGW V2 Name and Resource group name in V1 subscription. This will rewrite the existing resources.
146
145
* **sslCertificates: [PSApplicationGatewaySslCertificate]: Optional**. A comma-separated list of PSApplicationGatewaySslCertificate objects that you create to represent the TLS/SSL certs from your V1 gateway must be uploaded to the new V2 gateway. For each of your TLS/SSL certs configured for your Standard V1 or WAF V1 gateway, you can create a new PSApplicationGatewaySslCertificate object via the `New-AzApplicationGatewaySslCertificate` command shown here. You need the path to your TLS/SSL Cert file and the password.
147
146
148
147
This parameter is only optional if you don't have HTTPS listeners configured for your V1 gateway or WAF. If you have at least one HTTPS listener setup, you must specify this parameter.
@@ -193,7 +192,7 @@ To run the script:
193
192
To create a list of PSApplicationGatewayTrustedRootCertificate objects, see [New-AzApplicationGatewayTrustedRootCertificate](/powershell/module/Az.Network/New-AzApplicationGatewayTrustedRootCertificate).
194
193
* **privateIpAddress: [String]: Optional**. A specific private IP address that you want to associate to your new V2 gateway. This must be from the same VNet that you allocate for your new V2 gateway. If this isn't specified, the script allocates a private IP address for your V2 gateway.
195
194
* **publicIpResourceId: [String]: Optional**. The resourceId of existing public IP address (standard SKU) resource in your subscription that you want to allocate to the new V2 gateway.If public Ip resource name is provided, ensure that it exists in succeeded state.
196
-
If this isn't specified, the script allocates a new public IP in the same resource group. The name is the V2 gateway's name with *-IP* appended.If AppGwResourceGroupName is provided and public IP is not provided ensure that public IP resource with name AppGwV2Name-IP doesn’t exist in a resourcegroup with the name AppGwResourceGroupName in the V1 subscription
195
+
If this isn't specified, the script allocates a new public IP in the same resource group. The name is the V2 gateway's name with *-IP* appended.If AppGWResourceGroupName is provided and public IP is not provided ensure that public IP resource with name AppGWV2Name-IP doesn’t exist in a resourcegroup with the name AppGWResourceGroupName in the V1 subscription
197
196
198
197
* **validateMigration: [switch]: Optional**. Use this parameter if you want the script to do some basic configuration comparison validations after the V2 gateway creation and the configuration copy. By default, no validation is done.
199
198
* **enableAutoScale: [switch]: Optional**. Use this parameter if you want the script to enable autoscaling on the new V2 gateway after it's created. By default, autoscaling is disabled. You can always manually enable it later on the newly created V2 gateway.
* If you have FIPS mode enabled for your V1 gateway, it isn't migrated to your new V2 gateway. FIPS mode isn't supported in V2.
226
225
* If you have a Private IP only V1 gateway, the script generates a private and public IP address for the new V2 gateway. The Private IP only V2 gateway is currently in public preview. Once it becomes generally available, customers can utilize the script to transfer their private IP only V1 gateway to a private IP only V2 gateway.
227
226
* NTLM and Kerberos authentication isn't supported by Application Gateway V2. The script is unable to detect if the gateway is serving this type of traffic and may pose as a breaking change from V1 to V2 gateways if run.
227
+
* WAFv2 will be created in old WAF config mode, migration to WAF policy is required.
0 commit comments