Skip to content

Commit 6913cda

Browse files
committed
change migrate to upgrade
1 parent 0237d14 commit 6913cda

File tree

3 files changed

+22
-22
lines changed

3 files changed

+22
-22
lines changed

articles/web-application-firewall/ag/migrate-policy.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Migrate WAF policies for Azure Application Gateway
3-
description: Learn how to migrate Azure Web Application Firewall policies using Azure PowerShell.
2+
title: Upgrade WAF policies for Azure Application Gateway
3+
description: Learn how to upgrade Azure Web Application Firewall policies using Azure PowerShell.
44
services: web-application-firewall
55
ms.topic: how-to
66
author: vhorne
@@ -10,13 +10,13 @@ ms.author: victorh
1010
ms.custom: devx-track-azurepowershell
1111
---
1212

13-
# Migrate Web Application Firewall policies using Azure PowerShell
13+
# Upgrade Web Application Firewall policies using Azure PowerShell
1414

15-
This script makes it easy to transition from a WAF config or a custom rules-only WAF policy to a full WAF policy. You may see a warning in the portal that says *migrate to WAF policy*, or you may want the new WAF features such as Geomatch custom rules, per-site WAF policy, and per-URI WAF policy (preview), or the bot mitigation ruleset. To use any of these features, you need a full WAF policy associated to your application gateway.
15+
This script makes it easy to transition from a WAF config or a custom rules-only WAF policy to a full WAF policy. You may see a warning in the portal that says *upgrade to WAF policy*, or you may want the new WAF features such as Geomatch custom rules, per-site WAF policy, and per-URI WAF policy (preview), or the bot mitigation ruleset. To use any of these features, you need a full WAF policy associated to your application gateway.
1616

17-
For more information about creating a new WAF policy, see [Create Web Application Firewall policies for Application Gateway](create-waf-policy-ag.md). For information about migrating, see [Migrate to WAF policy](create-waf-policy-ag.md#migrate-to-waf-policy).
17+
For more information about creating a new WAF policy, see [Create Web Application Firewall policies for Application Gateway](create-waf-policy-ag.md). For information about migrating, see [upgrade to WAF policy](create-waf-policy-ag.md#upgrade-to-waf-policy).
1818

19-
## To migrate to WAF policy using the migration script
19+
## To upgrade to WAF policy using the migration script
2020

2121
Use the following steps to run the migration script:
2222

@@ -35,7 +35,7 @@ Use the following steps to run the migration script:
3535
```azurepowershell-interactive
3636
<#PSScriptInfo
3737
.DESCRIPTION
38-
Will be used to migrate to the application-gateway to a top level waf policy experience.
38+
Will be used to upgrade to the application-gateway to a top level waf policy experience.
3939
4040
.VERSION 1.0
4141
@@ -90,7 +90,7 @@ function ValidateInput ($appgwName, $resourceGroupName) {
9090
foreach ($disabled in $appgw.WebApplicationFirewallConfiguration.DisabledRuleGroups) {
9191
if ($disabled.Rules.Count -eq 0) {
9292
$ruleGroupName = $disabled.RuleGroupName
93-
Write-Error "The ruleGroup '$ruleGroupName' is disabled. Currently we can't migrate to a firewall policy when an entire ruleGroup is disabled. This feature will be delivered shortly. To continue, kindly ensure the entire rulegroups are not disabled. "
93+
Write-Error "The ruleGroup '$ruleGroupName' is disabled. Currently we can't upgrade to a firewall policy when an entire ruleGroup is disabled. This feature will be delivered shortly. To continue, kindly ensure the entire rulegroups are not disabled. "
9494
return $false
9595
}
9696
}
@@ -100,7 +100,7 @@ function ValidateInput ($appgwName, $resourceGroupName) {
100100
if ($appgw.WebApplicationFirewallConfiguration.Exclusions) {
101101
foreach ($excl in $appgw.WebApplicationFirewallConfiguration.Exclusions) {
102102
if ($null -ne $excl.MatchVariable -and $null -eq $excl.SelectorMatchOperator -and $null -eq $excl.Selector) {
103-
Write-Error " You have an exclusion entry(s) with the 'Equals any' operator. Currently we can't migrate to a firewall policy with 'Equals Any' operator. This feature will be delivered shortly. To continue, kindly ensure exclusion entries with 'Equals Any' operator is not present. "
103+
Write-Error " You have an exclusion entry(s) with the 'Equals any' operator. Currently we can't upgrade to a firewall policy with 'Equals Any' operator. This feature will be delivered shortly. To continue, kindly ensure exclusion entries with 'Equals Any' operator is not present. "
104104
return $false
105105
}
106106
}

articles/web-application-firewall/ag/upgrade-ag-waf-policy.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,58 +14,58 @@ ms.custom: devx-track-azurepowershell
1414

1515
Azure Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. Web Application Firewall Policies contain all the WAF settings and configurations. This includes exclusions, custom rules, managed rules, and so on. These policies are then associated with an application gateway (global), a listener (per-site), or a path-based rule (per-URI) for them to take effect.
1616

17-
Azure Application Gateway WAF v2 natively supports WAF policy. You should migrate your legacy WAF configuration to WAF policies.
17+
Azure Application Gateway WAF v2 natively supports WAF policy. You should upgrade your legacy WAF configuration to WAF policies.
1818

1919
- Policies offer a richer set of advanced features like newer managed rule sets, custom rules, per rule exclusions, bot protection, and the next generation of WAF engine available to you at no additional cost.
2020
- Unlike legacy WAF configuration, WAF policies can be defined once and shared across multiple gateways, listeners, and URL paths. This simplifies the management and deployment experience.
2121
- The latest features and future enhancements will only be available via WAF policies.
2222

2323
> [!IMPORTANT]
24-
> No further investments will be made for legacy WAF configuration. You are strongly encouraged to migrate from legacy WAF configuration to WAF Policy for easier management and a richer feature set at no additional cost. Legacy WAF configuration is on the path to retirement and Legacy WAF configuration on v2 gateways will not be supported starting January 1, 2024.
24+
> No further investments will be made for legacy WAF configuration. You are strongly encouraged to upgrade from legacy WAF configuration to WAF Policy for easier management and a richer feature set at no additional cost. Legacy WAF configuration is on the path to retirement and Legacy WAF configuration on v2 gateways will not be supported starting January 1, 2024.
2525
2626
## Upgrade Application Gateway Standard v2 to Application Gateway WAF v2
2727

2828
1. Locate the Application Gateway in the Azure portal. Select the Application Gateway and the select **Configuration** from the **Settings** menu on the left side.
2929
1. Under **Tier**, select **WAF**.
3030
1. Select **Save** to complete the upgrade from Application Gateway Standard to Application Gateway WAF.
3131

32-
## Migrate WAF v2 with legacy WAF configuration to WAF policy
32+
## Upgrade WAF v2 with legacy WAF configuration to WAF policy
3333

34-
You can migrate existing Application Gateways with WAF v2 from WAF legacy configuration to WAF policy directly without any downtime. You can migrate using either using the portal, Firewall Manager, or Azure PowerShell.
34+
You can upgrade existing Application Gateways with WAF v2 from WAF legacy configuration to WAF policy directly without any downtime. You can upgrade using either using the portal, Firewall Manager, or Azure PowerShell.
3535

3636
# [Portal](#tab/portal)
3737

3838
1. Logon to the Azure portal and select the Application Gateway WAF v2 that has a legacy WAF configuration.
3939
1. Select **Web Application Firewall** from the left menu, then select **Upgrade from WAF configuration**.
4040
1. Provide a name for the new WAF Policy and then select **Upgrade**. This creates a new WAF Policy based on the WAF configuration. You can also choose to associate a pre-existing WAF Policy instead of creating a new one.
41-
1. When the migration finishes, a new WAF Policy incorporating the previous WAF configuration and rules is created.
41+
1. When the upgrade finishes, a new WAF Policy incorporating the previous WAF configuration and rules is created.
4242

4343
# [Firewall Manager](#tab/fwm)
4444

4545
See [Configure WAF policies using Azure Firewall Manager](../shared/manage-policies.md).
4646

4747
# [PowerShell](#tab/powershell)
4848

49-
See [Migrate Web Application Firewall policies using Azure PowerShell](migrate-policy.md).
49+
See [Upgrade Web Application Firewall policies using Azure PowerShell](migrate-policy.md).
5050

5151
---
5252

5353
## Upgrade Application Gateway v1 to WAF v2 with WAF policy
5454

5555
Application Gateway v1 does not support WAF policy. Upgrading to WAF policy is a two step process:
5656

57-
- Migrate Application Gateway v1 to v2 version.
57+
- Upgrade Application Gateway v1 to v2 version.
5858
- Upgrade legacy WAF configuration to WAF policy.
5959

60-
1. Migrate from v1 to v2 Application Gateway.
60+
1. Upgrade from v1 to v2 Application Gateway.
6161

62-
For more information, see [Migrate Azure Application Gateway and Web Application Firewall from v1 to v2](../../application-gateway/migrate-v1-v2.md).
62+
For more information, see [Upgrade Azure Application Gateway and Web Application Firewall from v1 to v2](../../application-gateway/migrate-v1-v2.md).
6363

64-
When you complete the migration of v1 to v2, the Application Gateway v2 has a legacy WAF configuration.
64+
When you complete the upgrade of v1 to v2, the Application Gateway v2 has a legacy WAF configuration.
6565
2. Upgrade to Application Gateway WAF v2 with WAF Policy.
6666

67-
- If in Step 1 you migrated from Application Gateway Standard v1 to v2, see the previous section [Upgrade Application Gateway Standard v2 to Application Gateway WAF v2](#upgrade-application-gateway-standard-v2-to-application-gateway-waf-v2).
68-
- If in Step 1, you migrated from Application Gateway WAF v1 to Application Gateway WAF v2 with legacy configuration, see the previous section [Migrate WAF v2 with legacy WAF configuration to WAF policy](#migrate-waf-v2-with-legacy-waf-configuration-to-waf-policy) to migrate to Application Gateway WAF v2 SKU with WAF policy.
67+
- If in Step 1 you upgraded from Application Gateway Standard v1 to v2, see the previous section [Upgrade Application Gateway Standard v2 to Application Gateway WAF v2](#upgrade-application-gateway-standard-v2-to-application-gateway-waf-v2).
68+
- If in Step 1, you upgraded from Application Gateway WAF v1 to Application Gateway WAF v2 with legacy configuration, see the previous section [Upgrade WAF v2 with legacy WAF configuration to WAF policy](#upgrade-waf-v2-with-legacy-waf-configuration-to-waf-policy) to migrate to Application Gateway WAF v2 SKU with WAF policy.
6969

7070
## Next steps
7171

articles/web-application-firewall/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@
118118
items:
119119
- name: Upgrade to WAF policy
120120
href: ./ag/upgrade-ag-waf-policy.md
121-
- name: Migrate using PowerShell
121+
- name: Upgrade using PowerShell
122122
href: ./ag/migrate-policy.md
123123
- name: Per-site policies
124124
href: ./ag/per-site-policies.md

0 commit comments

Comments
 (0)