App Service on Azure Stack Hub 2021 Q3 release notes
These release notes describe the improvements and fixes in Azure App Service on Azure Stack Hub 2021 Q3 and any known issues. Known issues are divided into issues directly related to the deployment, update process, and issues with the build (post-installation).
Important
Update Azure Stack Hub to a supported version (or deploy the latest Azure Stack Development Kit) if necessary, before deploying or updating the App Service resource provider (RP). Be sure to read the RP release notes to learn about new functionality, fixes, and any known issues that could affect your deployment.
Supported Azure Stack Hub version App Service RP version 2301 2302 Installer (release notes) 2206.2.52 2302 Installer (release notes) 2108.2.127 2302 Installer (release notes)
Build reference
The App Service on Azure Stack Hub 2021 Q3 build number is 95.1.1.539
Prerequisites
Refer to the Before You Get Started documentation before beginning deployment.
Before you begin the upgrade of Azure App Service on Azure Stack to 2021 Q3:
Ensure your Azure Stack Hub is updated to 2108.
Ensure all roles are Ready in the Azure App Service Administration in the Azure Stack Hub Admin Portal
Backup App Service Secrets using the App Service Administration in the Azure Stack Hub Admin Portal
Back up the App Service and SQL Server Master Databases:
- AppService_Hosting;
- AppService_Metering;
- Master
Back up the Tenant App content file share
Important
Cloud operators are responsible for the maintenance and operation of the File Server and SQL Server. The resource provider does not manage these resources. The cloud operator is responsible for backing up the App Service databases and tenant content file share.
Syndicate the Custom Script Extension version 1.9.3 from the Marketplace
Updates
Azure App Service on Azure Stack Update 2021 Q3 includes the following improvements and fixes:
Updates to App Service Tenant, Admin, Functions portals and Kudu tools. Consistent with Azure Stack Portal SDK version.
Updates Azure Functions runtime to v1.0.13154.
Updates to core service to improve reliability and error messaging enabling easier diagnosis of common issues.
Updates to the following application frameworks and tools:
- ASP.NET Core
- 3.1.16
- 5.0.7
- 6.0.0
- Azul OpenJDK
- 8.52.0.23
- 11.44.13
- Git 2.33.1.1
- MSBuild 16.8.3
- MSDeploy 3.5.100419.17
- NodeJS
- 10.15.2
- 10.16.3
- 10.19.0
- 12.21.0
- 14.15.1
- 14.16.0
- NPM
- 6.14.11
- PHP
- 7.2.34
- 7.3.27
- 7.4.15
- Tomcat
- 8.5.58
- 9.0.38
- Wordpress 4.9.18
- Updated Kudu to 94.30524.5227
- ASP.NET Core
Updates to underlying operating system of all roles:
Cumulative Updates for Windows Server are now applied to Controller roles as part of deployment and upgrade
TLS Cipher Suites updated to maintain consistency with Azure Service.
Added support for 2020-09-01-hybrid profile
Issues fixed in this release
App Service can now be deployed when running the installer from a FIPS-Compliant Client machine
App Service Role Health is now automatically checked before completing App Service secret rotation procedures. If all roles not in ready state, secret rotation will be blocked
Outbound IP Address for sites is now displayed in the properties and Custom Domains blades within the tenant portal
Included further details on event of Custom Domain verification failure
Customers can successfully upload and delete private certificates in the tenant portal
Issue resolved whereby FrontEnd role instances can remain in Auto Repair loop because of a missing dependency in Functions scaling components
Resolved Single Sign On Failures to SCM Site because of changes in Azure AD endpoints
Updated load balancer health probes on Front-End roles and Management roles to be in alignment with Azure implementation. Traffic blocked from reaching Front-End role instance(s) when not in Ready state.
Aligned per site temporary directory quota size with Azure, limit on Dedicated Workers is 10 GB, Shared Workers is 500 MB
Added algorithm to Log Scavenger routines to prevent workers entering repair loop in event generated http logs exceed available space on worker.
Pre-Update steps
Review the known issues for update and take any action prescribed.
Post-deployment steps
Important
If you have provided the App Service resource provider with a SQL Always On Instance you MUST add the appservice_hosting and appservice_metering databases to an availability group and synchronize the databases to prevent any loss of service in the event of a database failover.
Known issues (update)
- In situations where a customer has converted the appservice_hosting and appservice_metering databases to contained database, upgrade may fail if logins have not been successfully migrated to contained users
Customers that have converted the appservice_hosting and appservice_metering databases to contained database post deployment, and have not successfully migrated the database logins to contained users, may experience upgrade failures.
Customers must execute the following script against the SQL Server hosting appservice_hosting and appservice_metering before upgrading your Azure App Service on Azure Stack Hub installation to 2020 Q3. This script is non-destructive and will not cause downtime.
This script must be run under the following conditions
By a user that has the system administrator privilege, for example the SQL SA Account;
If using SQL Always on, ensure the script is run from the SQL instance that contains all App Service logins in the form:
- appservice_hosting_FileServer
- appservice_hosting_HostingAdmin
- appservice_hosting_LoadBalancer
- appservice_hosting_Operations
- appservice_hosting_Publisher
- appservice_hosting_SecurePublisher
- appservice_hosting_WebWorkerManager
- appservice_metering_Common
- appservice_metering_Operations
- All WebWorker logins - which are in the form WebWorker_<instance ip address>
USE appservice_hosting
IF EXISTS(SELECT * FROM sys.databases WHERE Name=DB_NAME() AND containment = 1)
BEGIN
DECLARE @username sysname ;
DECLARE user_cursor CURSOR
FOR
SELECT dp.name
FROM sys.database_principals AS dp
JOIN sys.server_principals AS sp
ON dp.sid = sp.sid
WHERE dp.authentication_type = 1 AND dp.name NOT IN ('dbo','sys','guest','INFORMATION_SCHEMA');
OPEN user_cursor
FETCH NEXT FROM user_cursor INTO @username
WHILE @@FETCH_STATUS = 0
BEGIN
EXECUTE sp_migrate_user_to_contained
@username = @username,
@rename = N'copy_login_name',
@disablelogin = N'do_not_disable_login';
FETCH NEXT FROM user_cursor INTO @username
END
CLOSE user_cursor ;
DEALLOCATE user_cursor ;
END
GO
USE appservice_metering
IF EXISTS(SELECT * FROM sys.databases WHERE Name=DB_NAME() AND containment = 1)
BEGIN
DECLARE @username sysname ;
DECLARE user_cursor CURSOR
FOR
SELECT dp.name
FROM sys.database_principals AS dp
JOIN sys.server_principals AS sp
ON dp.sid = sp.sid
WHERE dp.authentication_type = 1 AND dp.name NOT IN ('dbo','sys','guest','INFORMATION_SCHEMA');
OPEN user_cursor
FETCH NEXT FROM user_cursor INTO @username
WHILE @@FETCH_STATUS = 0
BEGIN
EXECUTE sp_migrate_user_to_contained
@username = @username,
@rename = N'copy_login_name',
@disablelogin = N'do_not_disable_login';
FETCH NEXT FROM user_cursor INTO @username
END
CLOSE user_cursor ;
DEALLOCATE user_cursor ;
END
GO
Known issues (post-installation)
Workers are unable to reach file server when App Service is deployed in an existing virtual network and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
If you chose to deploy into an existing virtual network and an internal IP address to connect to your file server, you must add an outbound security rule, enabling SMB traffic between the worker subnet and the file server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
- Source: Any
- Source port range: *
- Destination: IP Addresses
- Destination IP address range: Range of IPs for your file server
- Destination port range: 445
- Protocol: TCP
- Action: Allow
- Priority: 700
- Name: Outbound_Allow_SMB445
To remove latency when workers are communicating with the file server we also advise adding the following rule to the Worker NSG to allow outbound LDAP and Kerberos traffic to your Active Directory Controllers if securing the file server using Active Directory, for example if you have used the Quickstart template to deploy a HA File Server and SQL Server.
Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
- Source: Any
- Source port range: *
- Destination: IP Addresses
- Destination IP address range: Range of IPs for your AD Servers, for example with the Quickstart template 10.0.0.100, 10.0.0.101
- Destination port range: 389,88
- Protocol: Any
- Action: Allow
- Priority: 710
- Name: Outbound_Allow_LDAP_and_Kerberos_to_Domain_Controllers
Known issues for Cloud Admins operating Azure App Service on Azure Stack
- Custom domains are not supported in disconnected environments
App Service performs domain ownership verification against public DNS endpoints, as a result custom domains are not supported in disconnected scenarios.
Next steps
- For an overview of Azure App Service, see Azure App Service on Azure Stack overview.
- For more information about how to prepare to deploy App Service on Azure Stack, see Before you get started with App Service on Azure Stack.
Feedback
Submit and view feedback for