Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Update Rollup 10 for Windows Azure Pack


View products that this article applies to.

Summary

This article describes the issues that are fixed in Update Rollup 10 for Windows Azure Pack (WAP). It also contains the installation instructions for the update rollup.

↑ Back to the top


Issues that are fixed in this update rollup

Issue 1

Windows Server 2016 only: Support for Encryption Supported virtual machines (VMs). 
Windows Server 2016, Virtual Machine Manager (VMM) and Service Provider Foundation (SPF) provide support for Encrypted Supported VMs, now WAP provides support for the three type of VMs in Windows Server 2016: regular VMs, Shielded VMs, and Encryption Supported VMs.

Issue 2

Windows Server 2016 only: Fix to incorrect Format of volume Signature in PDK File downloaded through WAP.

Issue 3

When a tenant updates a VM Size, the Hardware Profile ID is passed along to the SPF/VMM Virtual Machine Update event. This enables custom runbooks to change other properties as necessary.

Issue 4

Fix to Virtual Network property labels in the Quota page. The quotas for "Site-to-Site VPN" and "External IP addresses" labels in the Admin Portal VM Resource Provider are misleading because they read "per network." They are actually "per subscription."

Issue 5

Fix: When you update the VM Cloud Resource Provider, a duplicate Port setting is added leading ManagementOData to fail and return an error message that reads, "An item with the same key has already been added."

Issue 6

Windows Server 2016 only: Ability for the tenant user to add a network adapter to a VM while the VM is running. In UR 9.1 and earlier versions, new NICs could be added only after the VM was stopped.

Issue 7

Ability for the WAP Admin to include a SQL Server into multiple availability groups for High Availablility (HA) configurations. Available only in configurations that do not use SQL Resource Governor

Issue 8

Ability for the WAP Administyrator to include a server that's running Microsoft SQL Server into multiple availability groups for HA configurations.

Issue 9

Ability for the WAP user to enable the "Always On" feature of WAP websites.

↑ Back to the top


Download instructions

Update packages for Windows Azure Pack are available from Microsoft Update or by manual download.

Microsoft Update

To obtain and install an update package from Microsoft Update, follow these steps on a computer that has an applicable component installed:

  1. Click Start, and then click Control Panel.
  2. In Control Panel, double-click Windows Update.
  3. In the Windows Update window, click Check Online for updates from Microsoft Update.
  4. Click Important updates are available.
  5. Select the Update Rollup packages that you want to install, and then click OK.
  6. Click Install updates to install the selected update packages.

Manual download of the update packages

Go to the following website to manually download the update packages from the Microsoft Update Catalog:

Download Download the Windows Azure Pack update package now.

↑ Back to the top


Installation Instructions

  • Tenant site
  • Tenant API
  • Tenant Public API
  • Administration site
  • Administration API
  • Authentication
  • Windows Authentication
  • Usage
  • Monitoring
  • Microsoft SQL
  • MySQL
  • Web Application Gallery
  • Configuration site
  • Best Practices Analyzer
  • PowerShell API
To install the update .msi files for each Windows Azure Pack component, follow these steps:

  1. If the system is currently operational (handling customer traffic), schedule downtime for the Azure Pack servers. The Windows Azure Pack currently doesn't support rolling upgrades.
  2. Stop or redirect customer traffic to sites that you consider satisfactory.
  3. Create backup images of the web servers and the SQL Server databases.

    Notes

    • If you're using virtual machines, take snapshots of their current state.
    • If you're not using VMs, take a backup of each MgmtSvc-* folder in the Inetpub directory on each virtual machine that has a WAP component installed.
    • Collect information and files that are related to your certificates, host headers, and any port changes.
  4. If you're using your own theme for the Windows Azure Pack Tenant site, follow these instructionsto preserve your theme changes before you perform the update.
  5. Perform the update by running each .msi file on the computer on which the corresponding component is running. For example, run the MgmtSvc-AdminAPI.msi on the computer that's running "MgmtSvc-AdminAPI" site in Internet Information Services (IIS).
  6. For each node under Load Balancing, run the updates for components in the following order:

    1. If you're using the original self-signed certificates that are installed by WAP, the update operation replaces them. You have to export the new certificate and import to the other nodes under Load Balancing. These certificates have a CN=MgmtSvc-* (Self-Signed) naming pattern.
    2. Update Resource Provider (RP) services (SQL Server, My SQL, SPF/VMM, websites) as necessary. Make sure that the RP sites are running.
    3. Update the Tenant API site, Public Tenant API, Administrator API nodes, and Administrator and Tenant authentication sites.
    4. Update the Administrator and Tenant sites.
  7. Scripts to obtain database versions and update databases installed by the MgmtSvc-PowerShellAPI.msi are stored in the following location:
    C:\Program Files\Management Service\MgmtSvc-PowerShellAPI\Samples\Database
  8. If all components are updated and functioning as expected, you can open the traffic to your updated nodes. Otherwise, see the "Rollback instructions" section.
Note If you're updating from an update rollup that is the same as or earlier than Update Rollup 5 for Windows Azure Pack, follow these instructions to update the WAP database.

↑ Back to the top


Rollback instructions

If an issue occurs and you verify that a rollback is necessary, follow these steps:

  1. If snapshots are available from the second note item in step 3 in the "Installation instructions" section, apply the snapshots. If there are no snapshots, go to the next step.
  2. Use the backup that was taken in the first and third note items in step 3 in the "Installation instructions" section to restore your databases and computers.

    Note Don't leave the system in a partly updated state. Perform rollback operations on all computers on which Windows Azure Pack was installed, even if the update failed on one node.

    We recommend that you run the Windows Azure Pack Best Practice Analyzer on each Windows Azure Pack node to make sure that configuration items are correct.
  3. Open the traffic to your restored nodes.

↑ Back to the top


File Information

For a list of the files that are provided in this update rollup, download the file information for cumulative update 3158609.

↑ Back to the top


Keywords: kbqfe, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 3158609
Revision : 1
Created on : 1/7/2017
Published on : 7/15/2016
Exists online : False
Views : 390