Introduction

This article describes the issues that are fixed in Update Rollup 12 for Windows Azure Pack (WAP). This article also contains the installation instructions for this update rollup.

Issues that are fixed in this update rollup

  • Issue 1

    The desktop does not replace the internal IP address with an external NAT-mapped IP address and port in generated RDP files.

  • Issue 2

    Shielded virtual machines (VMs) still show preview text in the UI.

  • Issue 3

    In the tenant portal, users cannot detach a DVD. Therefore, users cannot remove a VM-attached ISO and replace it with a different one. Users expect to see an empty virtual DVD drive in the tenant portal and to be able to simply connect and eject ISO files.

  • Issue 4

    Tenants can't use user names that contain a dollar-sign ($) character when they create a credential through the WAP administration site for the SMA extension.

  • Issue 5

    WAP now supports and recommends enabling TLS 1.2 for all its incoming communications. For outgoing communications, we recommend enabling TLS 1.2  along with TLS 1.1 and TLS 1.0 for down negotiations. The following provides guidance about how to enable these communication protocols:

    4043907 TLS 1.2 Protocol Support Deployment Guide for Windows Azure Pack

How to obtain Update Rollup 12 for Windows Azure Pack

Download information

Update packages for Windows Azure Pack are available from Microsoft Update or by manual download.

Microsoft Update

This update is available through Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Manual download of the update package

Go to the following website to manually download the update package from the Microsoft Update Catalog:

Download the Windows Azure Pack update package now.

Installation information

These installation instructions are for the following Windows Azure Pack components:

  • Tenant site

  • Tenant API

  • Tenant Public API

  • Administration site

  • Administration API

  • Authentication

  • Windows Authentication

  • Usage

  • Monitoring

  • Microsoft SQL

  • MySQL

  • Web Application Gallery

  • Configuration site

  • Best Practices Analyzer

  • PowerShell API

To install the update .msi files for each Windows Azure Pack component, follow these steps:

  1. If the system is currently operational (handling customer traffic), schedule downtime for the Azure servers. The Windows Azure Pack doesn't currently support rolling upgrades.

  2. Stop or redirect customer traffic to alternative sites that you consider satisfactory.

  3. Create backups of the computers.

    Notes

    • If you're using virtual machines, take snapshots of their current state.

    • If you're not using virtual machines, take a backup of each MgmtSvc-* folder inside the Inetpub directory on each machine that has a WAP component installed.

    • Collect information and files that are related to your certificates, host headers, and any port changes.

  4. If you're using your own theme for the Windows Azure Pack Tenant site, see How to Persist a Windows Azure Pack Theme after Microsoft Upgrade before you perform the update.

  5. Perform the update by running each .msi file on the computer on which the corresponding component is running. For example, run MgmtSvc-AdminAPI.msi on the computer that is running the "MgmtSvc-AdminAPI" site in Internet Information Services (IIS).

  6. For each node that's under load balancing, run the updates for components in the following order:

    1. If you're using the original self-signed certificates installed by WAP, the update operation will replace them. You have to export the new certificate and import it to the other nodes that are under load balancing. These certificates have a "CN=MgmtSvc-* (self-signed)" naming pattern.

    2. Update Resource Provider (RP) services (SQL Server, My SQL, SPF/VMM, Websites) as necessary. Also, make sure that the RP sites are running.

    3. Update the Tenant API site, Public Tenant API, Administrator API nodes, and Administrator and Tenant Authentication sites.

    4. Update the Administrator and Tenant sites.

    Scripts to obtain database versions and update databases that are installed by the MgmtSvc-PowerShellAPI.msi are stored in the following location:

    C:\Program Files\Management Service\MgmtSvc-PowerShellAPI\Samples\Database
    If all components are updated and functioning as expected, you can open the traffic to your updated nodes. Otherwise, see the "Rollback instructions" section in this article.

    Note If you're updating from an update rollup that is the same as or earlier than Update Rollup 5 for Windows Azure Pack, follow these instructions to update the WAP database.

If a problem occurs, and you determine that a rollback is necessary, follow these steps:

  1. If snapshots are available as described in the second note in step 3 of the "Installation instructions" section, apply the snapshots. If there are no snapshots, go to the next step.

  2. Use the backup that was taken as described in the first and third notes in step 3 of the "Installation instructions" section to restore your databases and computers.

    Note Don't leave the system in a partly updated state. Perform rollback operations on all computers on which Windows Azure Pack was installed, even if the update failed on only one node.

    We recommend that you run the Windows Azure Pack Best Practice Analyzer (BPA) on each Windows Azure Pack node to make sure that configuration items are correct.

  3. Open the traffic to your restored nodes.

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Any additional feedback? (Optional)

Thank you for your feedback!

×