You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/operator/app-service-release-notes-2025r1.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ Azure App Service on Azure Stack Update 25R1 includes the following improvements
101
101
102
102
Newly fixed issues in this release:
103
103
104
-
- Application downtime should no longer be expected during Upgrade. In 24R1, an issue caused significant downtime due to a change in communication format within the Web Farm during upgrade, this has been mitigated in 25R1.
104
+
- Application downtime should no longer be expected during Upgrade. In 24R1, an issue caused significant downtime due to a change in communication format within the Web Farm during upgrade, the handling of this change has been improved and this change does not cause downtime in 25R1.
105
105
106
106
- Resolution to issues faced with Role Based Access Control and Single Sign on to Kudu and SCM sites
107
107
@@ -126,7 +126,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
126
126
## Post-deployment steps
127
127
128
128
> [!IMPORTANT]
129
-
> If you provided the App Service resource provider with a SQL Always On Instance you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
129
+
> If you've provided the App Service resource provider with a SQL Always On Instance, you MUST [add the appservice_hosting and appservice_metering databases to an availability group](/sql/database-engine/availability-groups/windows/availability-group-add-a-database) and synchronize the databases to prevent any loss of service in the event of a database failover.
130
130
131
131
## Known issues (update)
132
132
@@ -255,7 +255,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
255
255
256
256
## Known issues (post-installation)
257
257
258
-
-Workers are unable to reach file server when App Service is deployed in an existing virtual network, and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
258
+
-Worker instances are unable to reach file server when App Service is deployed in an existing virtual network, and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
259
259
260
260
If you chose to deploy into an existing virtual network and an internal IP address to connect to your file server, you must add an outbound security rule, enabling SMB (Server Message Block) traffic between the worker subnet and the file server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
261
261
- Source: Any
@@ -268,7 +268,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
268
268
- Priority: 700
269
269
- Name: Outbound_Allow_SMB445
270
270
271
-
- To remove latency when workers are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
271
+
- To remove latency when worker instances are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group) to allow outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
272
272
273
273
Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
0 commit comments