Skip to content

Commit a7d3568

Browse files
authored
Document quality improvements
1 parent 9638479 commit a7d3568

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

azure-stack/operator/app-service-release-notes-2025r1.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The App Service on Azure Stack Hub 25R1 build number is **102.10.2.9**
2020

2121
## What's new?
2222

23-
Azure App Service on Azure Stack Hub 25 R1 brings new updates to Azure Stack Hub and builds on the previously released 24R1 ([24R1 Release Notes](app-service-release-notes-2024r1.md)). Customers can install 25R1 directly without deploying 24R1 first.
23+
Azure App Service on Azure Stack Hub 25 R1 brings new updates to Azure Stack Hub and builds on the previously released 24R1 ([24R1 Release Notes](app-service-release-notes-2024r1.md)). Customers can install 25R1 directly without deploying 24R1 first.
2424

2525
- Updates to .NET 8 and 9.
2626
- Updates to App Service on Azure Stack Hub Resource Provider.
@@ -91,29 +91,29 @@ Azure App Service on Azure Stack Update 25R1 includes the following improvements
9191
- **Updates to underlying operating system of all roles**:
9292
- [2025-06 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5060526)](https://support.microsoft.com/help/5060526)
9393
- [2025-04 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system version 21H2 for x64 (KB5054693)](https://support.microsoft.com/help/5054693)
94-
- Definition updates for Windows Defender Antivirus and other Microsoft antimalware 1.429.494.0
94+
- Definition updates for Windows Defender Antivirus and other Microsoft anti-malware 1.429.494.0
9595

9696
- **Cumulative Updates for Windows Server are now applied to Controller roles as part of deployment and upgrade**.
9797

9898
- Synchronization of Cipher Suites in place and preserves any modifications performed as result of customer intervention with support.
9999

100100
## Issues fixed in this release
101101

102-
Newly fixed issues in this release
102+
Newly fixed issues in this release:
103103

104-
- Application downtime should no longer be expected during Upgrade. In 24R1 there was an issue which caused significant downtime due to a change in communication format within the Web Farm during upgrade, this has been mitigated in 25R1.
104+
- Application downtime should no longer be expected during Upgrade. In 24R1, an issue caused significant downtime due to a change in communication format within the Web Farm during upgrade, this has been mitigated in 25R1.
105105

106106
- Resolution to issues faced with Role Based Access Control and Single Sign on to Kudu and SCM sites
107107

108108
- Further process improvements in usage records service, to more effectively handle failures and outages during usage record commits
109109

110-
- Resolved issues in Kudu where new runs of Web Jobs cannot be started due to stalled jobs running
110+
- Resolved issues in Kudu where new runs of Web Jobs can't be started due to stalled jobs running
111111

112-
- Resolved issue when worker limits were not checked when scaling out an App Service Plan using a deployment template
112+
- Resolved issue when worker limits weren't checked when scaling out an App Service Plan using a deployment template
113113

114114
- Resolved issue where an invalid Data Service endpoint is set in configuration when all names in management server certificate are of wildcard format
115115

116-
- Enforced tcp prefix on all connection strings for the Resource Provider dataplane and ensured all roles receive updated connection string during rotation
116+
- Enforced tcp prefix on all connection strings for the Resource Provider data plane and ensured all roles receive updated connection string during rotation
117117

118118
- Enabled Health Check Feature in Tenant Portal
119119

@@ -126,15 +126,15 @@ Review the [known issues for update](#known-issues-update) and take any action p
126126
## Post-deployment steps
127127

128128
> [!IMPORTANT]
129-
> If you have provided the App Service resource provider with a SQL Always On Instance you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
129+
> If you provided the App Service resource provider with a SQL Always On Instance you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
130130
131131
## Known issues (update)
132132

133133
- In situations where you converted the appservice_hosting and appservice_metering databases to contained database, upgrade might fail if logins weren't successfully migrated to contained users.
134134

135135
Customers that converted the appservice_hosting and appservice_metering databases to contained database post deployment, and didn't successfully migrate the database logins to contained users, might experience upgrade failures.
136136

137-
Customers must execute the following script against the SQL Server hosting appservice_hosting and appservice_metering before upgrading your Azure App Service on Azure Stack Hub installation to 2020 Q3. This script is non-destructive and does not cause downtime.
137+
Customers must execute the following script against the SQL Server hosting appservice_hosting and appservice_metering before upgrading your Azure App Service on Azure Stack Hub installation to 2020 Q3. This script is nondestructive and doesn't cause downtime.
138138

139139
This script must be run under the following conditions:
140140

@@ -224,7 +224,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
224224
## Update the Entra ID Application with new Redirect URI
225225

226226
1. Sign into the Azure portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
227-
1. Using the Azure portal and navigate to **Microsoft Entra ID**.
227+
1. Use the Azure portal, and navigate to **Microsoft Entra ID**.
228228
1. Search your tenant for the `ApplicationClientId` you retrieved earlier.
229229
1. Select the application.
230230
1. Select **Authentication**.
@@ -268,7 +268,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
268268
- Priority: 700
269269
- Name: Outbound_Allow_SMB445
270270

271-
- To remove latency when workers are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you have used the Quickstart template to deploy a HA File Server and SQL Server.
271+
- To remove latency when workers are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
272272

273273
Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
274274
- Source: Any

0 commit comments

Comments
 (0)