App Service on Azure Stack update 4 release notes
Applies to: Azure Stack integrated systems and Azure Stack Development Kit
These release notes describe the improvements and fixes in Azure App Service on Azure Stack Update 4 and any known issues. Known issues are divided into issues directly related to the deployment, update process, and issues with the build (post-installation).
Apply the 1809 update to your Azure Stack integrated system or deploy the latest Azure Stack development kit before deploying Azure App Service 1.4.
The App Service on Azure Stack Update 4 build number is 78.0.13698.5
Refer to the Before You Get Started documentation before beginning deployment.
Before you begin the upgrade of Azure App Service on Azure Stack to 1.4:
Ensure all roles are Ready in the Azure App Service Administration in the Azure Stack Admin Portal
Back up the App Service and Master Databases:
Back up the Tenant App content file share
Syndicate the Custom Script Extension version 1.9 from the Marketplace
New features and fixes
Azure App Service on Azure Stack Update 4 includes the following improvements and fixes:
Resolution for CVE 2018-8600 Cross Site Scripting Vulnerability.
Added support for App Service 2018-02-01 API version
Updates to App Service Tenant, Admin, Functions portals and Kudu tools. Consistent with Azure Stack Portal SDK version.
Updates to core service to improve reliability and error messaging enabling easier diagnosis of common issues.
Updates to the following application frameworks and tools:
- Added NodeJS 10.6.0
- Added NPM 6.1.0
- Added Zulu OpenJDK 220.127.116.11
- Added Tomcat 8.5.34 and 9.0.12
- Added PHP Versions:
- Update to Python Versions:
- Updated Git for Windows to v 18.104.22.168
- Updated Kudu to 78.11022.3613
Updates to underlying operating system of all roles:
Resolved template validation issue when deploying Wordpress; DNN; and Orchard CMS gallery items
Resolved configuration issue when Azure Stack rotates the Azure Resource Manager client certificate
Restored functionality in the Cross Origin Resource Sharing settings in the App Service tenant portal
Display error message in App Service Admin portal experience when the resource provider control plane cannot connect to the configured SQL Server instance
Ensure endpoint is specified in custom storage connection string when specified in new Function application
Post update steps (optional)
For customers wishing to migrate to contained database for existing Azure App Service on Azure Stack deployments, execute these steps after the Azure App Service on Azure Stack 1.4 update has completed:
The migration procedure takes approximately 5-10 minutes. The procedure involves killing the existing database login sessions. Plan for downtime to migrate and validate Azure App Service on Azure Stack post migration. If you completed these steps after updating to Azure App Service on Azure Stack 1.3 then these steps are not required.
Enable contained database
sp_configure 'contained database authentication', 1; GO RECONFIGURE; GO
Converting a Database to Partially Contained, the conversion will incur downtime as all active sessions need to be killed
/******** [appservice_metering] Migration Start********/ USE [master]; -- kill all active sessions DECLARE @kill varchar(8000) = ''; SELECT @kill = @kill + 'kill ' + CONVERT(varchar(5), session_id) + ';' FROM sys.dm_exec_sessions WHERE database_id = db_id('appservice_metering') EXEC(@kill); USE [master] GO ALTER DATABASE [appservice_metering] SET CONTAINMENT = PARTIAL GO /********[appservice_metering] Migration End********/ /********[appservice_hosting] Migration Start********/ -- kill all active sessions USE [master]; DECLARE @kill varchar(8000) = ''; SELECT @kill = @kill + 'kill ' + CONVERT(varchar(5), session_id) + ';' FROM sys.dm_exec_sessions WHERE database_id = db_id('appservice_hosting') EXEC(@kill); -- Convert database to contained USE [master] GO ALTER DATABASE [appservice_hosting] SET CONTAINMENT = PARTIAL GO /********[appservice_hosting] Migration End********/ '''
Migrate Logins to Contained Database Users
IF EXISTS(SELECT * FROM sys.databases WHERE Name=DB_NAME() AND containment = 1) BEGIN DECLARE @username sysname ; DECLARE user_cursor CURSOR FOR SELECT dp.name FROM sys.database_principals AS dp JOIN sys.server_principals AS sp ON dp.sid = sp.sid WHERE dp.authentication_type = 1 AND dp.name NOT IN ('dbo','sys','guest','INFORMATION_SCHEMA'); OPEN user_cursor FETCH NEXT FROM user_cursor INTO @username WHILE @@FETCH_STATUS = 0 BEGIN EXECUTE sp_migrate_user_to_contained @username = @username, @rename = N'copy_login_name', @disablelogin = N'do_not_disable_login'; FETCH NEXT FROM user_cursor INTO @username END CLOSE user_cursor ; DEALLOCATE user_cursor ; END GO
Check if SQL Server has containment enabled
sp_configure @configname='contained database authentication'
Check existing contained behavior
SELECT containment FROM sys.databases WHERE NAME LIKE (SELECT DB_NAME())
Known issues (post-installation)
- Workers are unable to reach file server when App Service is deployed in an existing virtual network and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
If you chose to deploy into an existing virtual network and an internal IP address to connect to your file server, you must add an outbound security rule, enabling SMB traffic between the worker subnet and the file server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
- Source: Any
- Source port range: *
- Destination: IP Addresses
- Destination IP address range: Range of IPs for your file server
- Destination port range: 445
- Protocol: TCP
- Action: Allow
- Priority: 700
- Name: Outbound_Allow_SMB445
Known issues for Cloud Admins operating Azure App Service on Azure Stack
Refer to the documentation in the Azure Stack 1809 Release Notes
- For an overview of Azure App Service, see Azure App Service on Azure Stack overview.
- For more information about how to prepare to deploy App Service on Azure Stack, see Before you get started with App Service on Azure Stack.