title | description | documentationcenter | services | author | manager | editor | ms.assetid | ms.service | ms.devlang | ms.topic | ms.tgt_pltfrm | ms.custom | ms.workload | ms.date | ms.author |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Create, start, or delete an application gateway | Microsoft Docs |
This page provides instructions to create, configure, start, and delete an Azure application gateway |
na |
application-gateway |
davidmu1 |
timlt |
tysonn |
577054ca-8368-4fbf-8d53-a813f29dc3bc |
application-gateway |
na |
hero-article |
na |
H1Hack27Feb2017 |
infrastructure-services |
07/31/2017 |
davidmu |
[!div class="op_single_selector"]
Azure Application Gateway is a layer-7 load balancer. It provides failover, performance-routing HTTP requests between different servers, whether they are on the cloud or on-premises. Application Gateway provides many Application Delivery Controller (ADC) features including HTTP load balancing, cookie-based session affinity, Secure Sockets Layer (SSL) offload, custom health probes, support for multi-site, and many others. To find a complete list of supported features, visit Application Gateway Overview
This article walks you through the steps to create, configure, start, and delete an application gateway.
- Install the latest version of the Azure PowerShell cmdlets by using the Web Platform Installer. You can download and install the latest version from the Windows PowerShell section of the Downloads page.
- If you have an existing virtual network, either select an existing empty subnet or create a new subnet in your existing virtual network solely for use by the application gateway. You cannot deploy the application gateway to a different virtual network than the resources you intend to deploy behind the application gateway unless vnet peering is used. To learn more visit Vnet Peering
- Verify that you have a working virtual network with a valid subnet. Make sure that no virtual machines or cloud deployments are using the subnet. The application gateway must be by itself in a virtual network subnet.
- The servers that you configure to use the application gateway must exist or have their endpoints created either in the virtual network or with a public IP/VIP assigned.
When you use the New-AzureApplicationGateway
command to create the application gateway, no configuration is set at this point and the newly created resource are configured either by using XML or a configuration object.
The values are:
- Back-end server pool: The list of IP addresses of the back-end servers. The IP addresses listed should either belong to the virtual network subnet or should be a public IP/VIP.
- Back-end server pool settings: Every pool has settings like port, protocol, and cookie-based affinity. These settings are tied to a pool and are applied to all servers within the pool.
- Front-end port: This port is the public port that is opened on the application gateway. Traffic hits this port, and then gets redirected to one of the back-end servers.
- Listener: The listener has a front-end port, a protocol (Http or Https, these values are case-sensitive), and the SSL certificate name (if configuring SSL offload).
- Rule: The rule binds the listener and the back-end server pool and defines which back-end server pool the traffic should be directed to when it hits a particular listener.
To create an application gateway:
- Create an application gateway resource.
- Create a configuration XML file or a configuration object.
- Commit the configuration to the newly created application gateway resource.
Note
If you need to configure a custom probe for your application gateway, see Create an application gateway with custom probes by using PowerShell. Check out custom probes and health monitoring for more information.
To create the gateway, use the New-AzureApplicationGateway
cmdlet, replacing the values with your own. Billing for the gateway does not start at this point. Billing begins in a later step, when the gateway is successfully started.
The following example creates an application gateway by using a virtual network called "testvnet1" and a subnet called "subnet-1":
New-AzureApplicationGateway -Name AppGwTest -VnetName testvnet1 -Subnets @("Subnet-1")
Description, InstanceCount, and GatewaySize are optional parameters.
To validate that the gateway was created, you can use the Get-AzureApplicationGateway
cmdlet.
Get-AzureApplicationGateway AppGwTest
Name : AppGwTest
Description :
VnetName : testvnet1
Subnets : {Subnet-1}
InstanceCount : 2
GatewaySize : Medium
State : Stopped
VirtualIPs : {}
DnsName :
Note
The default value for InstanceCount is 2, with a maximum value of 10. The default value for GatewaySize is Medium. You can choose between Small, Medium and Large.
VirtualIPs and DnsName are shown as blank because the gateway has not started yet. These are created once the gateway is in the running state.
You can configure the application gateway by using XML or a configuration object.
In the following example, you use an XML file to configure all application gateway settings and commit them to the application gateway resource.
Copy the following text to Notepad.
<?xml version="1.0" encoding="utf-8"?>
<ApplicationGatewayConfiguration xmlns:i="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.microsoft.com/windowsazure">
<FrontendPorts>
<FrontendPort>
<Name>(name-of-your-frontend-port)</Name>
<Port>(port number)</Port>
</FrontendPort>
</FrontendPorts>
<BackendAddressPools>
<BackendAddressPool>
<Name>(name-of-your-backend-pool)</Name>
<IPAddresses>
<IPAddress>(your-IP-address-for-backend-pool)</IPAddress>
<IPAddress>(your-second-IP-address-for-backend-pool)</IPAddress>
</IPAddresses>
</BackendAddressPool>
</BackendAddressPools>
<BackendHttpSettingsList>
<BackendHttpSettings>
<Name>(backend-setting-name-to-configure-rule)</Name>
<Port>80</Port>
<Protocol>[Http|Https]</Protocol>
<CookieBasedAffinity>Enabled</CookieBasedAffinity>
</BackendHttpSettings>
</BackendHttpSettingsList>
<HttpListeners>
<HttpListener>
<Name>(name-of-the-listener)</Name>
<FrontendPort>(name-of-your-frontend-port)</FrontendPort>
<Protocol>[Http|Https]</Protocol>
</HttpListener>
</HttpListeners>
<HttpLoadBalancingRules>
<HttpLoadBalancingRule>
<Name>(name-of-load-balancing-rule)</Name>
<Type>basic</Type>
<BackendHttpSettings>(backend-setting-name-to-configure-rule)</BackendHttpSettings>
<Listener>(name-of-the-listener)</Listener>
<BackendAddressPool>(name-of-your-backend-pool)</BackendAddressPool>
</HttpLoadBalancingRule>
</HttpLoadBalancingRules>
</ApplicationGatewayConfiguration>
Edit the values between the parentheses for the configuration items. Save the file with extension .xml.
Important
The protocol item Http or Https is case-sensitive.
The following example shows how to use a configuration file to set up the application gateway. The example load balances HTTP traffic on public port 80 and sends network traffic to back-end port 80 between two IP addresses.
<?xml version="1.0" encoding="utf-8"?>
<ApplicationGatewayConfiguration xmlns:i="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.microsoft.com/windowsazure">
<FrontendPorts>
<FrontendPort>
<Name>FrontendPort1</Name>
<Port>80</Port>
</FrontendPort>
</FrontendPorts>
<BackendAddressPools>
<BackendAddressPool>
<Name>BackendPool1</Name>
<IPAddresses>
<IPAddress>10.0.0.1</IPAddress>
<IPAddress>10.0.0.2</IPAddress>
</IPAddresses>
</BackendAddressPool>
</BackendAddressPools>
<BackendHttpSettingsList>
<BackendHttpSettings>
<Name>BackendSetting1</Name>
<Port>80</Port>
<Protocol>Http</Protocol>
<CookieBasedAffinity>Enabled</CookieBasedAffinity>
</BackendHttpSettings>
</BackendHttpSettingsList>
<HttpListeners>
<HttpListener>
<Name>HTTPListener1</Name>
<FrontendPort>FrontendPort1</FrontendPort>
<Protocol>Http</Protocol>
</HttpListener>
</HttpListeners>
<HttpLoadBalancingRules>
<HttpLoadBalancingRule>
<Name>HttpLBRule1</Name>
<Type>basic</Type>
<BackendHttpSettings>BackendSetting1</BackendHttpSettings>
<Listener>HTTPListener1</Listener>
<BackendAddressPool>BackendPool1</BackendAddressPool>
</HttpLoadBalancingRule>
</HttpLoadBalancingRules>
</ApplicationGatewayConfiguration>
Next, set the application gateway. Use the Set-AzureApplicationGatewayConfig
cmdlet with a configuration XML file.
Set-AzureApplicationGatewayConfig -Name AppGwTest -ConfigFile "D:\config.xml"
The following example shows how to configure the application gateway by using configuration objects. All configuration items must be configured individually and then added to an application gateway configuration object. After creating the configuration object, you use the Set-AzureApplicationGateway
command to commit the configuration to the previously created application gateway resource.
Note
Before assigning a value to each configuration object, you need to declare what kind of object PowerShell uses for storage. The first line to create the individual items defines what Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model(object name)
are used.
Create all individual configuration items.
Create the front-end IP as shown in the following example.
$fip = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.FrontendIPConfiguration
$fip.Name = "fip1"
$fip.Type = "Private"
$fip.StaticIPAddress = "10.0.0.5"
Create the front-end port as shown in the following example.
$fep = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.FrontendPort
$fep.Name = "fep1"
$fep.Port = 80
Create the back-end server pool.
Define the IP addresses that are added to the back-end server pool as shown in the next example.
$servers = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.BackendServerCollection
$servers.Add("10.0.0.1")
$servers.Add("10.0.0.2")
Use the $server object to add the values to the back-end pool object ($pool).
$pool = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.BackendAddressPool
$pool.BackendServers = $servers
$pool.Name = "pool1"
Create the back-end server pool setting.
$setting = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.BackendHttpSettings
$setting.Name = "setting1"
$setting.CookieBasedAffinity = "enabled"
$setting.Port = 80
$setting.Protocol = "http"
Create the listener.
$listener = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.HttpListener
$listener.Name = "listener1"
$listener.FrontendPort = "fep1"
$listener.FrontendIP = "fip1"
$listener.Protocol = "http"
$listener.SslCert = ""
Create the rule.
$rule = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.HttpLoadBalancingRule
$rule.Name = "rule1"
$rule.Type = "basic"
$rule.BackendHttpSettings = "setting1"
$rule.Listener = "listener1"
$rule.BackendAddressPool = "pool1"
Assign all individual configuration items to an application gateway configuration object ($appgwconfig).
Add the front-end IP to the configuration.
$appgwconfig = New-Object Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.ApplicationGatewayConfiguration
$appgwconfig.FrontendIPConfigurations = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.FrontendIPConfiguration]"
$appgwconfig.FrontendIPConfigurations.Add($fip)
Add the front-end port to the configuration.
$appgwconfig.FrontendPorts = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.FrontendPort]"
$appgwconfig.FrontendPorts.Add($fep)
Add the back-end server pool to the configuration.
$appgwconfig.BackendAddressPools = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.BackendAddressPool]"
$appgwconfig.BackendAddressPools.Add($pool)
Add the back-end pool setting to the configuration.
$appgwconfig.BackendHttpSettingsList = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.BackendHttpSettings]"
$appgwconfig.BackendHttpSettingsList.Add($setting)
Add the listener to the configuration.
$appgwconfig.HttpListeners = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.HttpListener]"
$appgwconfig.HttpListeners.Add($listener)
Add the rule to the configuration.
$appgwconfig.HttpLoadBalancingRules = New-Object "System.Collections.Generic.List[Microsoft.WindowsAzure.Commands.ServiceManagement.Network.ApplicationGateway.Model.HttpLoadBalancingRule]"
$appgwconfig.HttpLoadBalancingRules.Add($rule)
Commit the configuration object to the application gateway resource by using Set-AzureApplicationGatewayConfig
.
Set-AzureApplicationGatewayConfig -Name AppGwTest -Config $appgwconfig
Once the gateway has been configured, use the Start-AzureApplicationGateway
cmdlet to start the gateway. Billing for an application gateway begins after the gateway has been successfully started.
Note
The Start-AzureApplicationGateway
cmdlet might take up to 15-20 minutes to finish.
Start-AzureApplicationGateway AppGwTest
Use the Get-AzureApplicationGateway
cmdlet to check the status of the gateway. If Start-AzureApplicationGateway
succeeded in the previous step, State should be Running, and Vip and DnsName should have valid entries.
The following example shows an application gateway that is up, running, and ready to take traffic destined for http://<generated-dns-name>.cloudapp.net
.
Get-AzureApplicationGateway AppGwTest
VERBOSE: 8:09:28 PM - Begin Operation: Get-AzureApplicationGateway
VERBOSE: 8:09:30 PM - Completed Operation: Get-AzureApplicationGateway
Name : AppGwTest
Description :
VnetName : testvnet1
Subnets : {Subnet-1}
InstanceCount : 2
GatewaySize : Medium
State : Running
Vip : 138.91.170.26
DnsName : appgw-1b8402e8-3e0d-428d-b661-289c16c82101.cloudapp.net
To delete the application gateway:
- Use the
Stop-AzureApplicationGateway
cmdlet to stop the gateway. - Use the
Remove-AzureApplicationGateway
cmdlet to remove the gateway. - Verify that the gateway has been removed by using the
Get-AzureApplicationGateway
cmdlet.
The following example shows the Stop-AzureApplicationGateway
cmdlet on the first line, followed by the output.
Stop-AzureApplicationGateway AppGwTest
VERBOSE: 9:49:34 PM - Begin Operation: Stop-AzureApplicationGateway
VERBOSE: 10:10:06 PM - Completed Operation: Stop-AzureApplicationGateway
Name HTTP Status Code Operation ID Error
---- ---------------- ------------ ----
Successful OK ce6c6c95-77b4-2118-9d65-e29defadffb8
Once the application gateway is in a stopped state, use the Remove-AzureApplicationGateway
cmdlet to remove the service.
Remove-AzureApplicationGateway AppGwTest
VERBOSE: 10:49:34 PM - Begin Operation: Remove-AzureApplicationGateway
VERBOSE: 10:50:36 PM - Completed Operation: Remove-AzureApplicationGateway
Name HTTP Status Code Operation ID Error
---- ---------------- ------------ ----
Successful OK 055f3a96-8681-2094-a304-8d9a11ad8301
To verify that the service has been removed, you can use the Get-AzureApplicationGateway
cmdlet. This step is not required.
Get-AzureApplicationGateway AppGwTest
VERBOSE: 10:52:46 PM - Begin Operation: Get-AzureApplicationGateway
Get-AzureApplicationGateway : ResourceNotFound: The gateway does not exist.
.....
If you want to configure SSL offload, see Configure an application gateway for SSL offload.
If you want to configure an application gateway to use with an internal load balancer, see Create an application gateway with an internal load balancer (ILB).
If you want more information about load balancing options in general, see: