You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/overview-v2.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: What is Azure Application Gateway v2?
3
-
description: Learn about Azure application Gateway v2 features
3
+
description: Learn about Azure application Gateway v2 features.
4
4
services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: application-gateway
7
7
ms.topic: overview
8
-
ms.date: 02/26/2024
8
+
ms.date: 04/25/2024
9
9
ms.author: greglin
10
10
ms.custom: references_regions
11
11
---
@@ -21,7 +21,7 @@ The new v2 SKU includes the following enhancements:
21
21
-**Zone redundancy**: An Application Gateway or WAF deployment can span multiple Availability Zones, removing the need to provision separate Application Gateway instances in each zone with a Traffic Manager. You can choose a single zone or multiple zones where Application Gateway instances are deployed, which makes it more resilient to zone failure. The backend pool for applications can be similarly distributed across availability zones.
22
22
23
23
Zone redundancy is available only where Azure Zones are available. In other regions, all other features are supported. For more information, see [Regions and Availability Zones in Azure](../reliability/availability-zones-service-support.md)
24
-
-**Static VIP**: Application Gateway v2 SKU supports the static VIP type exclusively. This ensures that the VIP associated with the application gateway doesn't change for the lifecycle of the deployment, even after a restart. There isn't a static VIP in v1, so you must use the application gateway URL instead of the IP address for domain name routing to App Services via the application gateway.
24
+
-**Static VIP**: Application Gateway v2 SKU supports the static VIP type exclusively. This ensures that the VIP associated with the application gateway doesn't change for the lifecycle of the deployment, even after a restart. There isn't a static VIP in v1, so you must use the application gateway URL instead of the IP address to route App Services via the application gateway.
25
25
-**Header Rewrite**: Application Gateway allows you to add, remove, or update HTTP request and response headers with v2 SKU. For more information, see [Rewrite HTTP headers with Application Gateway](./rewrite-http-headers-url.md)
26
26
-**Key Vault Integration**: Application Gateway v2 supports integration with Key Vault for server certificates that are attached to HTTPS enabled listeners. For more information, see [TLS termination with Key Vault certificates](key-vault-certs.md).
27
27
-**Mutual Authentication (mTLS)**: Application Gateway v2 supports authentication of client requests. For more information, see [Overview of mutual authentication with Application Gateway](mutual-authentication-overview.md).
@@ -45,9 +45,9 @@ The Standard_v2 and WAF_v2 SKU isn't currently available in the following region
45
45
46
46
## Pricing
47
47
48
-
With the v2 SKU, the pricing model is driven by consumption and is no longer attached to instance counts or sizes. The v2 SKU pricing has two components:
48
+
With the v2 SKU, the pricing model is based on consumption. It's no longer attached to instance counts or sizes. The v2 SKU pricing has two components:
49
49
50
-
-**Fixed price** - This is hourly (or partial hour) price to provision a Standard_v2 or WAF_v2 Gateway. Please note that 0 additional minimum instances still ensures high availability of the service which is always included with fixed price.
50
+
-**Fixed price** - This is an hourly (or partial hour) price to provision a Standard_v2 or WAF_v2 Gateway. It's important to understand that zero additional minimum instances still ensures high availability of the service, and is always included with fixed price.
51
51
-**Capacity Unit price** - This is a consumption-based cost that is charged in addition to the fixed cost. Capacity unit charge is also computed hourly or partial hourly. There are three dimensions to capacity unit - compute unit, persistent connections, and throughput. Compute unit is a measure of processor capacity consumed. Factors affecting compute unit are TLS connections/sec, URL Rewrite computations, and WAF rule processing. Persistent connection is a measure of established TCP connections to the application gateway in a given billing interval. Throughput is average Megabits/sec processed by the system in a given billing interval. The billing is done at a Capacity Unit level for anything above the reserved instance count.
52
52
53
53
Each capacity unit is composed of at most: 1 compute unit, 2500 persistent connections, and 2.22-Mbps throughput.
@@ -83,7 +83,8 @@ The following table compares the features available with each SKU.
83
83
| HTTP/2 support |✓|✓|
84
84
| Connection draining |✓|✓|
85
85
| Proxy NTLM authentication |✓||
86
-
86
+
| Path based rule encoding |✓||
87
+
| DHE Ciphers |✓||
87
88
> [!NOTE]
88
89
> The autoscaling v2 SKU now supports [default health probes](application-gateway-probe-overview.md#default-health-probe) to automatically monitor the health of all resources in its backend pool and highlight those backend members that are considered unhealthy. The default health probe is automatically configured for backends that don't have any custom probe configuration. To learn more, see [health probes in application gateway](application-gateway-probe-overview.md).
89
90
@@ -99,6 +100,9 @@ This section describes features and limitations of the v2 SKU that differ from t
99
100
|Performance logs in Azure diagnostics|Not supported.<br>Azure metrics should be used.|
100
101
|FIPS mode|Currently not supported.|
101
102
|Private frontend configuration only mode|Currently in public preview [Learn more](application-gateway-private-deployment.md).|
103
+
|Path based rule encoding |Not supported.<br> V2 decodes paths before routing. For example, V2 treats `/abc%2Fdef` the same as `/abc/def`. |
104
+
|Chunked file transfer |In the Standard_V2 configuration, turn off request buffering to support chunked file transfer. <br> In WAF_V2, turning off request buffering isn't possible because it has to look at the entire request to detect and block any threats. Therefore, the suggested alternative is to create a path rule for the affected URL and attach a disabled WAF policy to that path rule.|
105
+
|Cookie Affinity |Current V2 doesn't support appending the domain in session affinity Set-Cookie, which means that the cookie can't be used by client for the subdomains.|
102
106
|Microsoft Defender for Cloud integration|Not yet available.
0 commit comments