You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This PR includes several necessary updates as well as some cosmetic ones:
- [Functional] Add API Management NSG rules and API Management public IP to create an `stv2` instead of an `stv1` API Management instance.
- [Functional] Add `Priority` to `New-AzApplicationGatewayRequestRoutingRule` as the newer API version requires this parameter.
- [Cosmetic] Extract the desired domain name to a `$domain` variable for ease-of-use.
- [Cosmetic] Standardize on `contoso.net` by removing mentions of `contoso.com`.
Fixes MicrosoftDocs/azure-docs#108050
-------
cc: @dlepow
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-integrate-internal-vnet-appgateway.md
+48-20Lines changed: 48 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ To follow the steps described in this article, you must have:
52
52
53
53
## Scenario
54
54
55
-
In this article, you learn how to use a single API Management instance for internal and external consumers and make it act as a single front end for both on-premises and cloud APIs. You'll also understand how to expose only a subset of your APIs for external consumption by using routing functionality available in Application Gateway. In the example, the APIs are highlighted in green.
55
+
In this article, you learn how to use a single API Management instance for internal and external consumers and make it act as a single front end for both on-premises and cloud APIs. You'll create an API Management instance of the newer single-tenant version 2 (stv2) type. You'll also understand how to expose only a subset of your APIs for external consumption by using routing functionality available in Application Gateway. In the example, the APIs are highlighted in green.
56
56
57
57
In the first setup example, all your APIs are managed only from within your virtual network. Internal consumers can access all your internal and external APIs. Traffic never goes out to the internet. High-performance connectivity can be delivered via Azure ExpressRoute circuits. In the example, the internal consumers are highlighted in orange.
58
58
@@ -115,7 +115,7 @@ Resource Manager requires that all resource groups specify a location. This loca
115
115
116
116
The following example shows how to create a virtual network by using Resource Manager. The virtual network in this example consists of separate subnets for Application Gateway and API Management.
117
117
118
-
1. Create network security groups (NSGs) and NSG rules for the Application Gateway and API Management subnets.
118
+
1. Create a network security group (NSG) and NSG rules for the Application Gateway subnet.
1. Create a network security group (NSG) and NSG rules for the API Management subnet. [API Management stv2 requires several specific rules](https://learn.microsoft.com/en-us/azure/api-management/api-management-using-with-internal-vnet?tabs=stv2#configure-nsg-rules).
-AllocationMethod Static -Sku Standard -Force -DomainNameLabel "apim-contoso"
190
+
```
191
+
167
192
1. Create an API Management virtual network object by using the subnet `$apimSubnetData` you created.
168
193
169
194
```powershell
@@ -173,10 +198,13 @@ The following example shows how to create an API Management instance in a virtua
173
198
1. Create an API Management instance inside the virtual network. This example creates the service in the Developer service tier. Substitute a unique name for your API Management instance.
174
199
175
200
```powershell
201
+
$domain = "contoso.net"
176
202
$apimServiceName = "ContosoApi" # API Management service instance name, must be globally unique
It can take between 30 and 40 minutes to create and activate an API Management instance in this tier. After the previous command succeeds, see [DNS configuration required to access internal virtual network API Management service](api-management-using-with-internal-vnet.md#dns-configuration) to confirm access to it.
@@ -188,9 +216,9 @@ To set up custom domain names in API Management:
188
216
1. Initialize the following variables with the details of the certificates with private keys for the domains and the trusted root certificate. In this example, we use `api.contoso.net`, `portal.contoso.net`, and `management.contoso.net`.
189
217
190
218
```powershell
191
-
$gatewayHostname = "api.contoso.net" # API gateway host
192
-
$portalHostname = "portal.contoso.net" # API developer portal host
193
-
$managementHostname = "management.contoso.net" # API management endpoint host
219
+
$gatewayHostname = "api.$domain" # API gateway host
220
+
$portalHostname = "portal.$domain" # API developer portal host
221
+
$managementHostname = "management.$domain" # API management endpoint host
194
222
$gatewayCertPfxPath = "C:\Users\Contoso\gateway.pfx" # Full path to api.contoso.net .pfx file
195
223
$portalCertPfxPath = "C:\Users\Contoso\portal.pfx" # Full path to portal.contoso.net .pfx file
196
224
$managementCertPfxPath = "C:\Users\Contoso\management.pfx" # Full path to management.contoso.net .pfx file
@@ -232,8 +260,8 @@ To configure a private DNS zone for DNS resolution in the virtual network:
232
260
1. Create a private DNS zone and link the virtual network.
0 commit comments