You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/operator/app-service-release-notes-2025r1.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ The App Service on Azure Stack Hub 25R1 build number is **102.10.2.9**
20
20
21
21
## What's new?
22
22
23
-
Azure App Service on Azure Stack Hub 25 R1 brings new updates to Azure Stack Hub and builds on the previously released 24R1 ([24R1 Release Notes](app-service-release-notes-2024r1.md)). Customers can install 25R1 directly without deploying 24R1 first.
23
+
Azure App Service on Azure Stack Hub 25 R1 brings new updates to Azure Stack Hub and builds on the previously released 24R1 ([24R1 Release Notes](app-service-release-notes-2024r1.md)). Customers can install 25R1 directly without deploying 24R1 first.
24
24
25
25
- Updates to .NET 8 and 9.
26
26
- Updates to App Service on Azure Stack Hub Resource Provider.
@@ -91,29 +91,29 @@ Azure App Service on Azure Stack Update 25R1 includes the following improvements
91
91
-**Updates to underlying operating system of all roles**:
92
92
-[2025-06 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5060526)](https://support.microsoft.com/help/5060526)
93
93
-[2025-04 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system version 21H2 for x64 (KB5054693)](https://support.microsoft.com/help/5054693)
94
-
- Definition updates for Windows Defender Antivirus and other Microsoft antimalware 1.429.494.0
94
+
- Definition updates for Windows Defender Antivirus and other Microsoft anti-malware 1.429.494.0
95
95
96
96
-**Cumulative Updates for Windows Server are now applied to Controller roles as part of deployment and upgrade**.
97
97
98
98
- Synchronization of Cipher Suites in place and preserves any modifications performed as result of customer intervention with support.
99
99
100
100
## Issues fixed in this release
101
101
102
-
Newly fixed issues in this release
102
+
Newly fixed issues in this release:
103
103
104
-
- Application downtime should no longer be expected during Upgrade. In 24R1 there was an issue which caused significant downtime due to a change in communication format within the Web Farm during upgrade, this has been mitigated in 25R1.
104
+
- Application downtime should no longer be expected during Upgrade. In 24R1, an issue caused significant downtime due to a change in communication format within the Web Farm during upgrade, this has been mitigated in 25R1.
105
105
106
106
- Resolution to issues faced with Role Based Access Control and Single Sign on to Kudu and SCM sites
107
107
108
108
- Further process improvements in usage records service, to more effectively handle failures and outages during usage record commits
109
109
110
-
- Resolved issues in Kudu where new runs of Web Jobs cannot be started due to stalled jobs running
110
+
- Resolved issues in Kudu where new runs of Web Jobs can't be started due to stalled jobs running
111
111
112
-
- Resolved issue when worker limits were not checked when scaling out an App Service Plan using a deployment template
112
+
- Resolved issue when worker limits weren't checked when scaling out an App Service Plan using a deployment template
113
113
114
114
- Resolved issue where an invalid Data Service endpoint is set in configuration when all names in management server certificate are of wildcard format
115
115
116
-
- Enforced tcp prefix on all connection strings for the Resource Provider dataplane and ensured all roles receive updated connection string during rotation
116
+
- Enforced tcp prefix on all connection strings for the Resource Provider data plane and ensured all roles receive updated connection string during rotation
117
117
118
118
- Enabled Health Check Feature in Tenant Portal
119
119
@@ -126,15 +126,15 @@ Review the [known issues for update](#known-issues-update) and take any action p
126
126
## Post-deployment steps
127
127
128
128
> [!IMPORTANT]
129
-
> If you have provided the App Service resource provider with a SQL Always On Instance you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
129
+
> If you provided the App Service resource provider with a SQL Always On Instance you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
130
130
131
131
## Known issues (update)
132
132
133
133
- In situations where you converted the appservice_hosting and appservice_metering databases to contained database, upgrade might fail if logins weren't successfully migrated to contained users.
134
134
135
135
Customers that converted the appservice_hosting and appservice_metering databases to contained database post deployment, and didn't successfully migrate the database logins to contained users, might experience upgrade failures.
136
136
137
-
Customers must execute the following script against the SQL Server hosting appservice_hosting and appservice_metering before upgrading your Azure App Service on Azure Stack Hub installation to 2020 Q3. This script is non-destructive and does not cause downtime.
137
+
Customers must execute the following script against the SQL Server hosting appservice_hosting and appservice_metering before upgrading your Azure App Service on Azure Stack Hub installation to 2020 Q3. This script is nondestructive and doesn't cause downtime.
138
138
139
139
This script must be run under the following conditions:
140
140
@@ -224,7 +224,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
224
224
## Update the Entra ID Application with new Redirect URI
225
225
226
226
1. Sign into the Azure portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
227
-
1. Using the Azure portal and navigate to **Microsoft Entra ID**.
227
+
1. Use the Azure portal,and navigate to **Microsoft Entra ID**.
228
228
1. Search your tenant for the `ApplicationClientId` you retrieved earlier.
229
229
1. Select the application.
230
230
1. Select**Authentication**.
@@ -268,7 +268,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
268
268
- Priority: 700
269
269
- Name: Outbound_Allow_SMB445
270
270
271
-
- To remove latency when workers are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you have used the Quickstart template to deploy a HA File Server and SQL Server.
271
+
- To remove latency when workers are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
272
272
273
273
Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
0 commit comments