Skip to content

Commit 9343ed8

Browse files
author
gitName
committed
[APIM] stv1 retirement
1 parent 8357b21 commit 9343ed8

13 files changed

+36
-150
lines changed

articles/api-management/api-management-howto-integrate-internal-vnet-appgateway.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: dlepow
88
ms.service: azure-api-management
99
ms.topic: how-to
1010
ms.author: danlep
11-
ms.date: 04/17/2023
11+
ms.date: 04/17/2025
1212
ms.custom: engagement-fy23, devx-track-azurepowershell
1313
---
1414
# Integrate API Management in an internal virtual network with Application Gateway
@@ -50,7 +50,7 @@ To follow the steps described in this article, you must have:
5050

5151
## Scenario
5252

53-
In this article, you learn how to use a single API Management instance for internal and external consumers and make it act as a single front end for both on-premises and cloud APIs. You create an API Management instance of the newer single-tenant version 2 (stv2) type. You learn how to use public and private listeners in Application Gateway. You understand how to expose only a subset of your APIs for external consumption by using routing functionality available in Application Gateway. In the example, the APIs are highlighted in green.
53+
In this article, you learn how to use a single API Management instance for internal and external consumers and make it act as a single front end for both on-premises and cloud APIs. You create an API Management instance and deploy it in an Azure virtual network. You learn how to use public and private listeners in Application Gateway. You understand how to expose only a subset of your APIs for external consumption by using routing functionality available in Application Gateway. In the example, the APIs are highlighted in green.
5454

5555
In the first setup example, all your APIs are managed only from within your virtual network. Internal consumers can access all your internal and external APIs. Traffic never goes out to the internet. High-performance connectivity can be delivered via Azure ExpressRoute circuits. In the example, the internal consumers are highlighted in orange.
5656

@@ -170,7 +170,7 @@ The following example shows how to create a virtual network by using Resource Ma
170170
"nsg-agw" -SecurityRules $appGwRule1, $appGwRule2
171171
```
172172
173-
1. Create a network security group (NSG) and NSG rules for the API Management subnet. [API Management stv2 requires several specific NSG rules](api-management-using-with-internal-vnet.md#enable-vnet-connection).
173+
1. Create a network security group (NSG) and NSG rules for the API Management subnet. [API Management requires several specific NSG rules](api-management-using-with-internal-vnet.md#enable-vnet-connection).
174174
175175
```powershell
176176
$apimRule1 = New-AzNetworkSecurityRuleConfig -Name APIM-Management -Description "APIM inbound" `
@@ -223,7 +223,7 @@ The following example shows how to create a virtual network by using Resource Ma
223223
224224
The following example shows how to create an API Management instance in a virtual network configured for internal access only.
225225
226-
1. API Management stv2 requires a public IP with a unique `DomainNameLabel`.
226+
1. API Management requires a public IP with a unique `DomainNameLabel`.
227227
228228
```powershell
229229
$apimPublicIpAddressId = New-AzPublicIpAddress -ResourceGroupName $resGroupName -name "pip-apim" -location $location `

articles/api-management/api-management-howto-ip-addresses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ In the Developer, Basic, Standard, and Premium tiers of API Management, the publ
133133
* The service subscription is disabled or warned (for example, for nonpayment) and then reinstated. [Learn more about subscription states](/azure/cost-management-billing/manage/subscription-states)
134134
* (Developer and Premium tiers) Azure Virtual Network is added to or removed from the service.
135135
* (Developer and Premium tiers) API Management service is switched between external and internal VNet deployment mode.
136-
* (Developer and Premium tiers) API Management service is moved to a different subnet, [migrated](migrate-stv1-to-stv2.md) from the `stv1` to the `stv2` compute platform, or configured with a different public IP address resource.
136+
* (Developer and Premium tiers) API Management service is moved to a different subnet or configured with a different public IP address resource.
137137
* (Premium tier) [Availability zones](../reliability/migrate-api-mgt.md) are enabled, added, or removed.
138138
* (Premium tier) In [multi-regional deployments](api-management-howto-deploy-multi-region.md), the regional IP address changes if a region is vacated and then reinstated.
139139

articles/api-management/api-management-using-with-internal-vnet.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dlepow
55

66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 05/15/2024
8+
ms.date: 04/17/2025
99
ms.author: danlep
1010
---
1111

@@ -44,7 +44,7 @@ For configurations specific to the *external* mode, where the API Management end
4444

4545
## Enable VNet connection
4646

47-
### Enable VNet connectivity using the Azure portal (`stv2` platform)
47+
### Enable VNet connectivity using the Azure portal
4848

4949
1. Go to the [Azure portal](https://portal.azure.com) to find your API management instance. Search for and select **API Management services**.
5050
1. Choose your API Management instance.
@@ -68,16 +68,12 @@ After successful deployment, you should see your API Management service's **priv
6868
> [!NOTE]
6969
> Since the gateway URL is not registered on the public DNS, the test console available on the Azure portal will not work for an **internal** VNet deployed service. Instead, use the test console provided on the **developer portal**.
7070
71-
### Enable connectivity using a Resource Manager template (`stv2` platform)
71+
### Enable connectivity using a Resource Manager template
7272

7373
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-internal-vnet-publicip) (API version 2021-08-01 )
7474

7575
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/template-deployments/deploy-to-azure-button.svg" alt-text="Button to deploy the Resource Manager template to Azure." border="false" link="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.apimanagement%2Fapi-management-create-with-internal-vnet-publicip%2Fazuredeploy.json":::
7676

77-
### Enable connectivity using Azure PowerShell cmdlets (`stv1` platform)
78-
79-
[Create](/powershell/module/az.apimanagement/new-azapimanagement) or [update](/powershell/module/az.apimanagement/update-azapimanagementregion) an API Management instance in a VNet.
80-
8177
[!INCLUDE [api-management-recommended-nsg-rules](../../includes/api-management-recommended-nsg-rules.md)]
8278

8379
## DNS configuration

articles/api-management/api-management-using-with-vnet.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ For configurations specific to the *internal* mode, where the endpoints are acce
3030

3131
## Enable VNet connection
3232

33-
### Enable VNet connectivity using the Azure portal (`stv2` compute platform)
33+
### Enable VNet connectivity using the Azure portal
3434

3535
1. Go to the [Azure portal](https://portal.azure.com) to find your API management instance. Search for and select **API Management services**.
3636
1. Choose your API Management instance.
@@ -53,16 +53,13 @@ For configurations specific to the *internal* mode, where the endpoints are acce
5353

5454
It can take 15 to 45 minutes to update the API Management instance. Instances in the Developer tier have downtime during the process. Instances in the Premium tier don't have downtime during the process.
5555

56-
### Enable connectivity using a Resource Manager template (`stv2` compute platform)
56+
### Enable connectivity using a Resource Manager template
5757

5858
* Azure Resource Manager [template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.apimanagement/api-management-create-with-external-vnet-publicip) (API version 2021-08-01)
5959

6060
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/template-deployments/deploy-to-azure-button.svg" alt-text="Button to deploy the Resource Manager template to Azure." border="false" link="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.apimanagement%2Fapi-management-create-with-external-vnet-publicip%2Fazuredeploy.json":::
6161

6262

63-
### Enable connectivity using Azure PowerShell cmdlets (`stv1` platform)
64-
65-
[Create](/powershell/module/az.apimanagement/new-azapimanagement) or [update](/powershell/module/az.apimanagement/update-azapimanagementregion) an API Management instance in a VNet.
6663

6764
[!INCLUDE [api-management-recommended-nsg-rules](../../includes/api-management-recommended-nsg-rules.md)]
6865

articles/api-management/protect-with-ddos-protection.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Defend API Management against DDoS attacks
2+
title: Defend API Management Against DDoS Attacks
33
description: Learn how to protect your API Management instance in an external virtual network against volumetric and protocol DDoS attacks by using Azure DDoS Protection.
44
services: api-management
55
author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: how-to
9-
ms.date: 01/24/2023
9+
ms.date: 04/17/2025
1010
ms.author: danlep
1111
---
1212
# Defend your Azure API Management instance against DDoS attacks
@@ -34,9 +34,8 @@ Enabling Azure DDoS Protection for API Management is supported only for instance
3434

3535
* An API Management instance
3636
* The instance must be deployed in an Azure VNet in [external mode](api-management-using-with-vnet.md) or [internal mode](api-management-using-with-internal-vnet.md).
37-
* The instance must be configured with an Azure public IP address resource, which is supported only on the API Management `stv2` [compute platform](compute-infrastructure.md).
38-
> [!NOTE]
39-
> If the instance is hosted on the `stv1` platform, you must [migrate](compute-infrastructure.md#how-do-i-migrate-to-the-stv2-platform) to the `stv2` platform.
37+
* The instance must be configured with an Azure public IP address resource.
38+
4039
* An Azure DDoS Protection [plan](../ddos-protection/manage-ddos-protection.md)
4140
* The plan you select can be in the same, or different, subscription than the virtual network and the API Management instance. If the subscriptions differ, they must be associated to the same Microsoft Entra tenant.
4241
* You may use a plan created using either the Network DDoS protection SKU or IP DDoS Protection SKU. See [Azure DDoS Protection SKU Comparison](../ddos-protection/ddos-protection-sku-comparison.md).

articles/api-management/v2-service-tiers-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure API Management - v2 tiers
2+
title: Azure API Management - V2 Tiers
33
description: Introduction to key scenarios, capabilities, and concepts of the v2 tiers (SKUs) of the Azure API Management service.
44
services: api-management
55
author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 11/20/2024
9+
ms.date: 04/17/2025
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -120,7 +120,7 @@ A: No. Currently you can't migrate an existing API Management instance (in the C
120120

121121
### Q: What's the relationship between the stv2 compute platform and the v2 tiers?
122122

123-
A: They're not related. stv2 is a [compute platform](compute-infrastructure.md) version of the Developer, Basic, Standard, and Premium tier service instances. stv2 is a successor to the stv1 compute platform [that retired in 2024](./breaking-changes/stv1-platform-retirement-august-2024.md).
123+
A: They're not related. stv2 is a compute platform version of the Developer, Basic, Standard, and Premium tier service instances. stv2 is a successor to the stv1 compute platform that retired in 2024.
124124

125125
### Q: Will I still be able to provision Developer, Basic, Standard, or Premium tier services?
126126

articles/api-management/virtual-network-injection-resources.md

Lines changed: 2 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,19 @@ author: dlepow
55

66
ms.service: azure-api-management
77
ms.topic: concept-article
8-
ms.date: 06/10/2024
8+
ms.date: 04/17/2025
99
ms.author: danlep
1010
---
1111

1212
# Network resource requirements for API Management injection into a virtual network
1313

1414
[!INCLUDE [api-management-availability-premium-dev](../../includes/api-management-availability-premium-dev.md)]
1515

16-
The following are virtual network resource requirements for injection of an API Management Developer or Premium instance into a virtual network. Some requirements differ depending on the version (`stv2` or `stv1`) of the [compute platform](compute-infrastructure.md) hosting your API Management instance.
16+
The following are virtual network resource requirements for injection of an API Management Developer or Premium instance into a virtual network.
1717

1818
> [!NOTE]
1919
> To inject a Premium v2 instance in a virtual network, the requirements and configuration are different. [Learn more](inject-vnet-v2.md)
2020
21-
#### [stv2](#tab/stv2)
2221

2322
* An Azure Resource Manager virtual network is required.
2423
* The subnet used to connect to the API Management instance might contain other Azure resource types.
@@ -28,14 +27,6 @@ The following are virtual network resource requirements for injection of an API
2827
* The API Management service, virtual network and subnet, and public IP address resource (if provided) must be in the same region and subscription.
2928
* For multi-region API Management deployments, configure virtual network resources separately for each location.
3029

31-
#### [stv1](#tab/stv1)
32-
33-
* An Azure Resource Manager virtual network is required.
34-
* The subnet used to connect to the API Management instance must be dedicated to API Management. It can't contain other Azure resource types.
35-
* The subnet used to connect to the API Management instance shouldn't have any delegations enabled. The "Delegate subnet to a service" setting for the subnet should be set to "None".
36-
* The API Management service, virtual network, and subnet resources must be in the same region and subscription.
37-
* For multi-region API Management deployments, configure virtual network resources separately for each location.
38-
---
3930

4031
## Subnet size
4132

@@ -90,22 +81,10 @@ Related information:
9081
9182
## Limitations
9283

93-
Some virtual network limitations differ depending on the version (`stv2` or `stv1`) of the [compute platform](compute-infrastructure.md) hosting your API Management instance.
94-
95-
#### [stv2](#tab/stv2)
96-
97-
* A subnet containing API Management instances can't be moved across subscriptions.
98-
* For multi-region API Management deployments configured in internal virtual network mode, users own the routing and are responsible for managing the load balancing across multiple regions.
99-
* To import an API to API Management from an [OpenAPI specification](import-and-publish.md), the specification URL must be hosted at a publicly accessible internet address.
100-
101-
#### [stv1](#tab/stv1)
10284

10385
* A subnet containing API Management instances can't be moved across subscriptions.
10486
* For multi-region API Management deployments configured in internal virtual network mode, users own the routing and are responsible for managing the load balancing across multiple regions.
10587
* To import an API to API Management from an [OpenAPI specification](import-and-publish.md), the specification URL must be hosted at a publicly accessible internet address.
106-
* Due to platform limitations, connectivity between a resource in a globally peered virtual network in another region and an API Management service in internal mode doesn't work. For more information, see the [virtual network documentation](../virtual-network/virtual-network-manage-peering.md#requirements-and-constraints).
107-
108-
---
10988

11089

11190
## Related content

0 commit comments

Comments
 (0)