इस लेख में आप सीखेंगे कि एज़्योर स्टैक हब में ऐप सर्विस को कैसे तैनात किया जाए, जो आपके उपयोगकर्ताओं को वेब, एपीआई और एज़्योर फ़ंक्शंस एप्लिकेशन बनाने की क्षमता देता है। आपको:
इस आलेख में वर्णित चरणों का उपयोग करके अपने एज़्योर स्टैक हब परिनियोजन में ऐप सेवा संसाधन प्रदाता जोड़ें
à एक  ¢   एक ¢ ऐप सेवा संसाधन प्रदाता को स्थापित करने के बाद, आप इसे अपने ऑफ़र और योजनाओं में शामिल कर सकते हैं। उपयोगकर्ता तब सेवा प्राप्त करने के लिए सदस्यता ले सकते हैं और ऐप बनाना शुरू कर सकते हैं। ऐप सेवा संसाधन प्रदाता को स्थापित करने में कम से कम एक घंटा लगता है। आवश्यक समय की अवधि इस बात पर निर्भर करती है कि आप कितने रोल इंस्टेंसेस परिनियोजित करते हैं। परिनियोजन के दौरान, इंस्टॉलर निम्न कार्य चलाता है:
à एक  ¢   ¢ डिफ़ॉल्ट प्रदाता सदस्यता में आवश्यक संसाधन प्रदाताओं को पंजीकृत करता है
à एक ¢ एक एक ¢ संसाधन समूह और वर्चुअल नेटवर्क बनाएं (यदि आवश्यक हो)
à एक  ¢  एक ¢ ऐप सेवा स्थापना कलाकृतियों, उपयोग सेवा और संसाधन हाइड्रेशन के लिए संग्रहण खाते और कंटेनर बनाएं
à एक ¢ एक  एक ¢ ऐप सेवा कलाकृतियों को डाउनलोड करें और उन्हें ऐप सेवा भंडारण खाते में अपलोड करें
à एक     एक कंप्यूटर से एक व्यवस्थापक के रूप में appservice.exe चलाएं जो एज़्योर स्टैक हब एडमिन एज़्योर रिसोर्स मैनेजमेंट एंडपॉइंट तक पहुंच सकता है
à एक     ¢ कोई भी ऐप सेवा तैनात करें या नवीनतम संस्करण में अपग्रेड का चयन करें
à एक  ¢   ¢ कोई भी समीक्षा नहीं करता है और Microsoft सॉफ़्टवेयर लाइसेंस शर्तों को स्वीकार करता है और फिर अगला का चयन करता है
à एक      कोई नहीं समीक्षा करें और तृतीय-पक्ष लाइसेंस शर्तों को स्वीकार करें और फिर अगला चुनें
à एक  ¢    कोई नहीं सुनिश्चित करें कि ऐप सेवा क्लाउड कॉन्फ़िगरेशन जानकारी सही है। यदि आपने ASDK परिनियोजन के दौरान डिफ़ॉल्ट सेटिंग्स का उपयोग किया है, तो आप डिफ़ॉल्ट मान स्वीकार कर सकते हैं। लेकिन, यदि आपने एएसडीके परिनियोजित करते समय विकल्पों को अनुकूलित किया है, या एज़्योर स्टैक हब एकीकृत प्रणाली पर परिनियोजित कर रहे हैं, तो आपको अंतरों को दर्शाने के लिए इस विंडो में मानों को संपादित करना होगा। उदाहरण के लिए, यदि आप डोमेन प्रत्यय mycloud.com का उपयोग करते हैं, तो आपके एज़्योर स्टैक हब टेनेंट एज़्योर रिसोर्स मैनेजर एंडपॉइंट को प्रबंधन में बदलना होगा।
.mycloud.com. Review these settings, and then select Next to save the settings
âÃÂâ None On the next App Service Installer page you will connect to your Azure Stack Hub:
âÃÂâ None Select the connection method you wish to use - Credential or Service Principal
âÃÂâ
âÃÂâ If you're using Azure Active Directory (Azure AD), enter the Azure AD admin account and password that you provided when you deployed Azure Stack Hub. Select Connect
âÃÂâ If you're using Active Directory Federation Services (AD FS), provide your admin account. For example, [email protected]. Enter your password, and then select Connect
âÃÂâ
âÃÂâ The service principal that you use must have Owner rights on the Default Provider Subscription
âÃÂâ Provide the Service Principal ID, Certificate File, and Password and select Connect
âÃÂâ None In Azure Stack Hub Subscriptions, select the Default Provider Subscription. Azure App Service on Azure Stack Hub must be deployed in the Default Provider Subscription
âÃÂâ None In the Azure Stack Hub Locations, select the location that corresponds to the region you're deploying to. For example, select local if you're deploying to the ASDK
âÃÂâ None Administrators can specify a three character Deployment Prefix for the individual instances in each Virtual Machine Scale Set that are deployed. This is useful if managing multiple Azure Stack Hub instances
âÃÂâ None Now you can deploy into an existing virtual network that you configured using these steps, or let the App Service installer create a new virtual network and subnets. To create a VNet, follow these steps: a. Select Create VNet with default settings, accept the defaults, and then select Next. b. Alternatively, select Use existing VNet and Subnets. Complete the following actions:
âÃÂâ Select the Resource Group that contains your virtual network
âÃÂâ Choose the Virtual Network name that you want to deploy to
âÃÂâ Select the correct Subnet values for each of the required role subnets
âÃÂâ None Enter the info for your file share and then select Next. The address of the file share must use the Fully Qualified Domain Name (FQDN) or the IP address of your File Server. For example, ppservicefileserver.local.cloudapp.azurestack.external\websites, or .0.0.1\websites. If you're using a file server, which is domain joined, you must provide the full username including domain. For example, myfileserverdomain\FileShareOwner. The installer tries to test connectivity to the file share before proceeding. But, if you're deploying to an existing virtual network, this connectivity test might fail. You're given a warning and a prompt to continue. If the file share info is correct, continue the deployment
âÃÂâ None On the next App Service Installer page, follow these steps: a. In the Identity Application ID box, enter the GUID for the Identity application you created as part of the pre-requisites. b. In the Identity Application certificate file box, enter (or browse to) the location of the certificate file. c. In the Identity Application certificate password box, enter the password for the certificate. This password is the one that you made note of when you used the script to create the certificates. d. In the Azure Resource Manager root certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ None For each of the three certificate file boxes, select Browse and navigate to the appropriate certificate file. You must provide the password for each certificate. These certificates are the ones that you created in Prerequisites for deploying App Service on Azure Stack Hub. Select Next after entering all the information. If you used a different domain suffix when you created the certificates, your certificate file names don't use local.AzureStack.external. Instead, use your custom domain info
âÃÂâ None Enter the SQL Server details for the server instance used to host the App Service resource provider database and then select Next. The installer validates the SQL connection properties
The App Service installer tries to test connectivity to the SQL Server before proceeding. If you're deploying to an existing virtual network, this connectivity test might fail. You're given a warning and a prompt to continue. If the SQL Server info is correct, continue the deployment
âÃÂâ None Review the role instance and SKU options. The defaults populate with the minimum number of instances and the minimum SKU for each role in a production deployment. For ASDK deployment, you can scale the instances down to lower SKUs to reduce the core and memorybut you will experience a performance degradation. A summary of vCPU and memory requirements is provided to help plan your deployment. After you make your selections, select Next. For production deployments, following the guidance in Capacity planning for Azure App Service server roles in Azure Stack Hub. Manages and maintains the health of the App Service cloud. Manages the App Service Azure Resource Manager and API endpoints, portal extensions (admin, tenant, Functions portal), and the data service. To support failover, increase the recommended instances to 2. Hosts web or API apps and Azure Functions apps. You might want to add more instances. As an operator, you can define your offering and choose any SKU tier. The tiers must have a minimum of one vCPU. Windows Server 2022 Core isn't a supported platform image for use with Azure App Service on Azure Stack Hub. Don't use evaluation images for production deployments
âÃÂâ None In the Select Platform Image box, choose your deployment Windows Server 2022 virtual machine (VM) image from the images available in the compute resource provider for the App Service cloud. Select Next
âÃÂâ None On the next App Service Installer page, follow these steps: a. Enter the Worker Role VM admin user name and password. b. Enter the Other Roles VM admin user name and password
âÃÂâ None On the App Service Installer summary page, follow these steps: a. Verify the selections you made. To make changes, use the Previous buttons to visit previous pages. b. If the configurations are correct, select the check box. c. To start the deployment, select Next
âÃÂâ None On the next App Service Installer page, follow these steps: a. Track the installation progress. App Service on Azure Stack Hub can take up to 240 minutes to deploy based on the default selections and age of the base Windows 2016 Datacenter image. If you've provided the App Service RP with a SQL Always On Instance you must add the appservice_hosting and appservice_metering databases to an availability group and synchronize the databases to prevent any loss of service in the event of a database failover. If you're deploying to an existing virtual network and using an internal IP address to connect to your file server, you must add an outbound security rule. This rule enables SMB traffic between the worker subnet and the file server. In the administrator portal, go to the WorkersNsg Network Security Group and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your file server To remove latency when workers are communicating with the file server we also advise adding the following rule to the Worker NSG to allow outbound LDAP and Kerberos traffic to your Active Directory Controllers if securing the file server using Active Directory, for example if you have used the Quickstart template to deploy a HA File Server and SQL Server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your AD Servers, for example with the Quickstart template 10.0.0.100, 10.0.0.101
âÃÂâ None In the Azure Stack Hub administrator portal, go to Administration - App Service
âÃÂâ None In the overview, under status, check to see that the Status displays All roles are ready. After you deploy and register the App Service resource provider, test it to make sure that users can deploy web and API apps. You need to create an offer that has the Microsoft.Web namespace in the plan. You also need a tenant subscription that subscribes to the offer. For more info, see Create offer and Create plan. You must have a tenant subscription to create apps that use App Service on Azure Stack Hub. The only tasks that a service admin can complete in the administrator portal are related to the resource provider administration of App Service. This includes adding capacity, configuring deployment sources, and adding Worker tiers and SKUs. To create web, API, and Azure Functions apps, you must use the user portal and have a tenant subscription
âÃÂâ None Under Web App, enter a name in Web app
âÃÂâ None Under Resource Group, select New. Enter a name for the Resource Group
âÃÂâ None Under App Service plan, enter a name for the App Service plan
âÃÂâ None A tile for the new web app appears on the dashboard. Select the tile
âÃÂâ None On Web App, select Browse to view the default website for this app
âÃÂâ None In the Azure Stack Hub user portal, select +, go to the Azure Marketplace, deploy a Django website, and then wait for the deployment to finish. The Django web platform uses a file system-based database. It doesn't require any additional resource providers, such as SQL or MySQL
âÃÂâ None If you also deployed a MySQL resource provider, you can deploy a WordPress website from the Marketplace. When you're prompted for database parameters, enter the user name as User1@Server1, with the user name and server name of your choice
âÃÂâ None If you also deployed a SQL Server resource provider, you can deploy a DNN website from the Marketplace. When you're prompted for database parameters, choose a database in the computer running SQL Server that's connected to your resource provider. Installing the App Service resource provider takes at least an hour. The length of time needed depends on how many role instances you deploy. During the deployment, the installer runs the following tasks:
âÃÂâ Registers the required resource providers in the Default Provider Subscription
âÃÂâ Create Resource Group and Virtual network (if necessary)
âÃÂâ Create Storage accounts and containers for App Service installation artifacts, usage service, and resource hydration
âÃÂâ Download App Service artifacts and upload them to the App Service storage account
âÃÂâ None Run appservice.exe as an admin from a computer that can access the Azure Stack Hub Admin Azure Resource Management Endpoint
âÃÂâ None Select Deploy App Service or upgrade to the latest version
âÃÂâ None Review and accept the Microsoft Software License Terms and then select Next
âÃÂâ None Review and accept the third-party license terms and then select Next
âÃÂâ None Make sure that the App Service cloud configuration information is correct. If you used the default settings during ASDK deployment, you can accept the default values. But, if you customized the options when you deployed the ASDK, or are deploying on an Azure Stack Hub integrated system, you must edit the values in this window to reflect the differences. For example, if you use the domain suffix mycloud.com, your Azure Stack Hub Tenant Azure Resource Manager endpoint must change to management..mycloud.com. Review these settings, and then select Next to save the settings
âÃÂâ None On the next App Service Installer page you will connect to your Azure Stack Hub:
âÃÂâ None Select the connection method you wish to use - Credential or Service Principal
âÃÂâ
âÃÂâ If you're using Azure Active Directory (Azure AD), enter the Azure AD admin account and password that you provided when you deployed Azure Stack Hub. Select Connect
âÃÂâ If you're using Active Directory Federation Services (AD FS), provide your admin account. For example, [email protected]. Enter your password, and then select Connect
âÃÂâ
âÃÂâ The service principal that you use must have Owner rights on the Default Provider Subscription
âÃÂâ Provide the Service Principal ID, Certificate File, and Password and select Connect
âÃÂâ None In Azure Stack Hub Subscriptions, select the Default Provider Subscription. Azure App Service on Azure Stack Hub must be deployed in the Default Provider Subscription
âÃÂâ None In the Azure Stack Hub Locations, select the location that corresponds to the region you're deploying to. For example, select local if you're deploying to the ASDK
âÃÂâ None Now you can deploy into an existing virtual network that you configured using these steps, or let the App Service installer create a new virtual network and subnets. To create a VNet, follow these steps: a. Select Create VNet with default settings, accept the defaults, and then select Next. b. Alternatively, select Use existing VNet and Subnets. Complete the following actions:
âÃÂâ Select the Resource Group that contains your virtual network
âÃÂâ Choose the Virtual Network name that you want to deploy to
âÃÂâ Select the correct Subnet values for each of the required role subnets
âÃÂâ None Enter the info for your file share and then select Next. The address of the file share must use the Fully Qualified Domain Name (FQDN) or the IP address of your File Server. For example, ppservicefileserver.local.cloudapp.azurestack.external\websites, or .0.0.1\websites. If you're using a file server, which is domain joined, you must provide the full username including domain. For example, myfileserverdomain\FileShareOwner. The installer tries to test connectivity to the file share before proceeding. But, if you're deploying to an existing virtual network, this connectivity test might fail. You're given a warning and a prompt to continue. If the file share info is correct, continue the deployment
âÃÂâ None On the next App Service Installer page, follow these steps: a. In the Identity Application ID box, enter the GUID for the Identity application you created as part of the pre-requisites. b. In the Identity Application certificate file box, enter (or browse to) the location of the certificate file. c. In the Identity Application certificate password box, enter the password for the certificate. This password is the one that you made note of when you used the script to create the certificates. d. In the Azure Resource Manager root certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ None For each of the three certificate file boxes, select Browse and navigate to the appropriate certificate file. You must provide the password for each certificate. These certificates are the ones that you created in Prerequisites for deploying App Service on Azure Stack Hub. Select Next after entering all the information. If you used a different domain suffix when you created the certificates, your certificate file names don't use local.AzureStack.external. Instead, use your custom domain info
âÃÂâ None Enter the SQL Server details for the server instance used to host the App Service resource provider database and then select Next. The installer validates the SQL connection properties
The App Service installer tries to test connectivity to the SQL Server before proceeding. If you're deploying to an existing virtual network, this connectivity test might fail. You're given a warning and a prompt to continue. If the SQL Server info is correct, continue the deployment
âÃÂâ None Review the role instance and SKU options. The defaults populate with the minimum number of instances and the minimum SKU for each role in a production deployment. For ASDK deployment, you can scale the instances down to lower SKUs to reduce the core and memorybut you will experience a performance degradation. A summary of vCPU and memory requirements is provided to help plan your deployment. After you make your selections, select Next. For production deployments, following the guidance in Capacity planning for Azure App Service server roles in Azure Stack Hub. Manages and maintains the health of the App Service cloud. Manages the App Service Azure Resource Manager and API endpoints, portal extensions (admin, tenant, Functions portal), and the data service. To support failover, increase the recommended instances to 2. Hosts web or API apps and Azure Functions apps. You might want to add more instances. As an operator, you can define your offering and choose any SKU tier. The tiers must have a minimum of one vCPU. Windows Server 2016 Core isn't a supported platform image for use with Azure App Service on Azure Stack Hub. Don't use evaluation images for production deployments
âÃÂâ None In the Select Platform Image box, choose your deployment Windows Server 2016 virtual machine (VM) image from the images available in the compute resource provider for the App Service cloud. Select Next
âÃÂâ None On the next App Service Installer page, follow these steps: a. Enter the Worker Role VM admin user name and password. b. Enter the Other Roles VM admin user name and password
âÃÂâ None On the App Service Installer summary page, follow these steps: a. Verify the selections you made. To make changes, use the Previous buttons to visit previous pages. b. If the configurations are correct, select the check box. c. To start the deployment, select Next
âÃÂâ None On the next App Service Installer page, follow these steps: a. Track the installation progress. App Service on Azure Stack Hub can take up to 240 minutes to deploy based on the default selections and age of the base Windows 2016 Datacenter image. If you've provided the App Service RP with a SQL Always On Instance you must add the appservice_hosting and appservice_metering databases to an availability group and synchronize the databases to prevent any loss of service in the event of a database failover. If you're deploying to an existing virtual network and using an internal IP address to connect to your file server, you must add an outbound security rule. This rule enables SMB traffic between the worker subnet and the file server. In the administrator portal, go to the WorkersNsg Network Security Group and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your file server To remove latency when workers are communicating with the file server we also advise adding the following rule to the Worker NSG to allow outbound LDAP and Kerberos traffic to your Active Directory Controllers if securing the file server using Active Directory, for example if you have used the Quickstart template to deploy a HA File Server and SQL Server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your AD Servers, for example with the Quickstart template 10.0.0.100, 10.0.0.101
âÃÂâ None In the Azure Stack Hub administrator portal, go to Administration - App Service
âÃÂâ None In the overview, under status, check to see that the Status displays All roles are ready. After you deploy and register the App Service resource provider, test it to make sure that users can deploy web and API apps. You need to create an offer that has the Microsoft.Web namespace in the plan. You also need a tenant subscription that subscribes to the offer. For more info, see Create offer and Create plan. You must have a tenant subscription to create apps that use App Service on Azure Stack Hub. The only tasks that a service admin can complete in the administrator portal are related to the resource provider administration of App Service. This includes adding capacity, configuring deployment sources, and adding Worker tiers and SKUs. To create web, API, and Azure Functions apps, you must use the user portal and have a tenant subscription
âÃÂâ None Under Web App, enter a name in Web app
âÃÂâ None Under Resource Group, select New. Enter a name for the Resource Group
âÃÂâ None Under App Service plan, enter a name for the App Service plan
âÃÂâ None A tile for the new web app appears on the dashboard. Select the tile
âÃÂâ None On Web App, select Browse to view the default website for this app
âÃÂâ None In the Azure Stack Hub user portal, select +, go to the Azure Marketplace, deploy a Django website, and then wait for the deployment to finish. The Django web platform uses a file system-based database. It doesn't require any additional resource providers, such as SQL or MySQL
âÃÂâ None If you also deployed a MySQL resource provider, you can deploy a WordPress website from the Marketplace. When you're prompted for database parameters, enter the user name as User1@Server1, with the user name and server name of your choice
âÃÂâ None If you also deployed a SQL Server resource provider, you can deploy a DNN website from the Marketplace. When you're prompted for database parameters, choose a database in the computer running SQL Server that's connected to your resource provider
In this article you learn how to deploy the Azure App Service resource provider to an Azure Stack Hub environment that is:
âÃÂâ Not connected to the internet. To add the Azure App Service resource provider to your offline Azure Stack Hub deployment, you must complete these top-level tasks:
âÃÂâ Complete the prerequisite steps (like purchasing certificates, which can take a few days to receive)
âÃÂâ Download and extract the installation and helper files to a machine that's connected to the internet. To deploy Azure App Service in an offline environment, first create an offline installation package on a machine that's connected to the internet
âÃÂâ None Run the AppService.exe installer on a machine that's connected to the internet
âÃÂâ None Select Advanced > Create offline installation package. This step will take several minutes to complete
âÃÂâ None The Azure App Service installer creates an offline installation package and displays the path to it. You can select Open folder to open the folder in File Explorer
âÃÂâ None Copy the installer (AppService.exe) and the offline installation package to a machine that has connectivity to your Azure Stack Hub. Complete the offline installation of Azure App Service on Azure Stack Hub
âÃÂâ None Run appservice.exe as an admin from a computer that can reach the Azure Stack Hub Admin Azure Resource Management endpoint
âÃÂâ None Browse to the location of the offline installation package you previously created, and then select Next
âÃÂâ None Review and accept the Microsoft Software License Terms, and then select Next
âÃÂâ None Review and accept the third-party license terms, and then select Next
âÃÂâ None Make sure the Azure App Service cloud configuration info is correct. If you used the default settings during ASDK deployment, you can accept the default values here. However, if you customized the options when you deployed Azure Stack Hub or are deploying on an integrated system, you must edit the values in this window to reflect those changes. For example, if you use the domain suffix mycloud.com, your Azure Stack Hub Tenant Azure Resource Manager endpoint must change to . After you confirm your info, select Next
âÃÂâ None On the next App Service Installer page you will connect to your Azure Stack Hub:
âÃÂâ None Select the connection method you wish to use - Credential or Service Principal
âÃÂâ Credential
âÃÂâ If you're using Azure Active Directory (Azure AD), enter the Azure AD admin account and password that you provided when you deployed Azure Stack Hub. Select Connect
âÃÂâ If you're using Active Directory Federation Services (AD FS), provide your admin account. For example, [email protected]. Enter your password, and then select Connect
âÃÂâ Service Principal
âÃÂâ The service principal that you use must have Owner rights on the Default Provider Subscription
âÃÂâ Provide the Service Principal ID, Certificate File, and Password and select Connect
âÃÂâ None In Azure Stack Hub Subscriptions, select the Default Provider Subscription. Azure App Service on Azure Stack Hub must be deployed in the Default Provider Subscription
âÃÂâ None In the Azure Stack Hub Locations, select the location that corresponds to the region you're deploying to. For example, select local if you're deploying to the ASDK
âÃÂâ None Administrators can specify a three character Deployment Prefix for the individual instances in each Virtual Machine Scale Set that are deployed. This is useful if managing multiple Azure Stack Hub instances
âÃÂâ None You can allow the Azure App Service installer to create a virtual network and associated subnets. Or, you can deploy into an existing virtual network, as configured through these steps
âÃÂâ None To use the Azure App Service installer method, select Create VNet with default settings, accept the defaults, and then select Next
âÃÂâ None To deploy into an existing network, select Use existing VNet and Subnets, and then:
âÃÂâ Select the Resource Group option that contains your virtual network
âÃÂâ Choose the Virtual Network name you want to deploy into
âÃÂâ Select the correct Subnet values for each of the required role subnets
âÃÂâ None Enter the info for your file share and then select Next. The address of the file share must use the Fully Qualified Domain Name (FQDN) or IP address of your file server. For example: ppservicefileserver.local.cloudapp.azurestack.external\websites, or .0.0.1\websites. If you're using a file server that's domain-joined, you must provide the full user name, including the domain. For example: . The installer tries to test connectivity to the file share before proceeding. However, if you choose to deploy into an existing virtual network, the installer might be unable to connect to the file share and displays a warning asking whether you want to continue. Verify the file share info and continue if it's correct
âÃÂâ
âÃÂâ In the Identity Application ID box, enter the GUID for the Identity application you created as part of the pre-requisites
âÃÂâ In the Identity Application certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ In the Identity Application certificate password box, enter the password for the certificate. This password is the one that you made note of when you used the script to create the certificates
âÃÂâ In the Azure Resource Manager root certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ None For each of the three certificate file boxes, select Browse and navigate to the appropriate certificate file. You must provide the password for each certificate. These certificates are the ones that you created in Prerequisites for deploying App Service on Azure Stack Hub. Select Next after entering all the information. If you used a different domain suffix when you created the certificates, your certificate file names don't use local.AzureStack.external. Instead, use your custom domain info
âÃÂâ None Enter the SQL Server details for the server instance used to host the Azure App Service resource provider databases, and then select Next. The installer validates the SQL connection properties. You must enter either the internal IP or the FQDN for the SQL Server name. The installer tries to test connectivity to the computer running SQL Server before proceeding. However, if you chose to deploy into an existing virtual network, the installer might not be able to connect to the computer running SQL Server and displays a warning asking whether you want to continue. Verify the SQL Server info and continue if it's correct. From Azure App Service on Azure Stack Hub 1.3 onward, the installer checks that the computer running SQL Server has database containment enabled at the SQL Server level. If it doesn't, you're prompted with the following exception: Enable contained database authentication for SQL server by running below command on SQL server (Ctrl+C to copy)sp_configure 'contained database authentication', 1; GO RECONFIGURE; GOFor more information, see the release notes for Azure App Service on Azure Stack Hub 1.3
âÃÂâ None Review the role instance and SKU options. The defaults populate with the minimum number of instances and the minimum SKU for each role in a production deployment. For ASDK deployment, you can scale the instances down to lower SKUs to reduce the core and memorybut you will experience a performance degradation. A summary of vCPU and memory requirements is provided to help plan your deployment. After you make your selections, select Next. For production deployments, follow the guidance in Capacity planning for Azure App Service server roles in Azure Stack Hub. Manages and maintains the health of the App Service cloud. Manages the App Service Azure Resource Manager and API endpoints, portal extensions (admin, tenant, Functions portal), and the data service. To support failover, increase the recommended instances to 2. Hosts web or API apps and Azure Functions apps. You might want to add more instances. As an operator, you can define your offering and choose any SKU tier. The tiers must have a minimum of one vCPU
âÃÂâ None In the Select Platform Image box, choose your prepared Windows Server 2022 Datacenter virtual machine (VM) image from the images available on the compute resource provider for the Azure App Service cloud. Select Next. Windows Server 2022 Core is not a supported platform image for use with Azure App Service on Azure Stack Hub. Don't use evaluation images for production deployments. Azure App Service on Azure Stack Hub requires that Microsoft .NET 3.5.1 SP1 be activated on the image used for deployment. Marketplace-syndicated Windows Server 2022 images don't have this feature enabled. Therefore, you must create and use a Windows Server 2022 image with this feature pre-enabled. See Prerequisites for deploying App Service on Azure Stack Hub for details on creating a custom image and adding to Marketplace. Be sure to specify the following when adding the image to Marketplace:
âÃÂâ
âÃÂâ Enter the Worker Role VM admin user name and password
âÃÂâ Enter the Other Roles VM admin user name and password
âÃÂâ
âÃÂâ Verify the selections you made. To make changes, use the Previous buttons to visit previous pages
âÃÂâ If the configurations are correct, select the check box
âÃÂâ To start the deployment, select Next
âÃÂâ
âÃÂâ None Track the installation progress. App Service on Azure Stack Hub can take up to 240 minutes to deploy based on the default selections and age of the base Windows 2016 Datacenter image. If you've provided the Azure App Service RP with a SQL Always On Instance, you must add the appservice_hosting and appservice_metering databases to an availability group. You must also synchronize the databases to prevent any loss of service in the event of a database failover. If you chose to deploy into an existing virtual network and an internal IP address to connect to your file server, you must add an outbound security rule, enabling SMB traffic between the worker subnet and the file server. In the administrator portal, go to the WorkersNsg Network Security Group and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your file server To remove latency when workers are communicating with the file server we also advise adding the following rule to the Worker NSG to allow outbound LDAP and Kerberos traffic to your Active Directory Controllers if securing the file server using Active Directory, for example if you have used the Quickstart template to deploy a HA File Server and SQL Server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your AD Servers, for example with the Quickstart template 10.0.0.100, 10.0.0.101
âÃÂâ None In the Azure Stack Hub administrator portal, go to Administration - App Service
âÃÂâ None In the overview, under status, check to see that the Status displays All roles are ready. After you deploy and register the Azure App Service resource provider, test it to make sure that users can deploy web and API apps. You must create an offer that has the Microsoft.Web namespace within the plan. Then, you need to have a tenant subscription that subscribes to this offer. For more info, see Create offer and Create plan. You must have a tenant subscription to create apps that use Azure App Service on Azure Stack Hub. The only capabilities that a service admin can complete within the administrator portal are related to the resource provider administration of Azure App Service. These capabilities include adding capacity, configuring deployment sources, and adding Worker tiers and SKUs. As of the third technical preview, to create web, API, and Azure Functions apps, you must use the user portal and have a tenant subscription
âÃÂâ None On the Web App blade, type a name in the Web app box
âÃÂâ None Under Resource Group, select New. Type a name in the Resource Group box
âÃÂâ None On the App Service plan blade, type a name in the App Service plan box
âÃÂâ None In less than a minute, a tile for the new web app appears on the dashboard. Select the tile
âÃÂâ None On the Web App blade, select Browse to view the default website for this app
âÃÂâ None In the Azure Stack Hub user portal, select +, go to Azure Marketplace, deploy a Django website, and wait for successful completion. The Django web platform uses a file system-based database. It doesn't require any additional resource providers, such as SQL or MySQL
âÃÂâ None If you also deployed a MySQL resource provider, you can deploy a WordPress website from Azure Marketplace. When you're prompted for database parameters, enter the user name as User1@Server1, with the user name and server name of your choice
âÃÂâ None If you also deployed a SQL Server resource provider, you can deploy a DNN website from Azure Marketplace. When you're prompted for database parameters, choose a database on the computer running SQL Server that's connected to your resource provider. Complete the offline installation of Azure App Service on Azure Stack Hub
âÃÂâ None Run appservice.exe as an admin from a computer that can reach the Azure Stack Hub Admin Azure Resource Management endpoint
âÃÂâ None Browse to the location of the offline installation package you previously created, and then select Next
âÃÂâ None Review and accept the Microsoft Software License Terms, and then select Next
âÃÂâ None Review and accept the third-party license terms, and then select Next
âÃÂâ None Make sure the Azure App Service cloud configuration info is correct. If you used the default settings during ASDK deployment, you can accept the default values here. However, if you customized the options when you deployed Azure Stack Hub or are deploying on an integrated system, you must edit the values in this window to reflect those changes. For example, if you use the domain suffix mycloud.com, your Azure Stack Hub Tenant Azure Resource Manager endpoint must change to . After you confirm your info, select Next
âÃÂâ None On the next App Service Installer page you will connect to your Azure Stack Hub:
âÃÂâ None Select the connection method you wish to use - Credential or Service Principal
âÃÂâ Credential
âÃÂâ If you're using Azure Active Directory (Azure AD), enter the Azure AD admin account and password that you provided when you deployed Azure Stack Hub. Select Connect
âÃÂâ If you're using Active Directory Federation Services (AD FS), provide your admin account. For example, [email protected]. Enter your password, and then select Connect
âÃÂâ Service Principal
âÃÂâ The service principal that you use must have Owner rights on the Default Provider Subscription
âÃÂâ Provide the Service Principal ID, Certificate File, and Password and select Connect
âÃÂâ None In Azure Stack Hub Subscriptions, select the Default Provider Subscription. Azure App Service on Azure Stack Hub must be deployed in the Default Provider Subscription
âÃÂâ None In the Azure Stack Hub Locations, select the location that corresponds to the region you're deploying to. For example, select local if you're deploying to the ASDK
âÃÂâ None You can allow the Azure App Service installer to create a virtual network and associated subnets. Or, you can deploy into an existing virtual network, as configured through these steps
âÃÂâ None To use the Azure App Service installer method, select Create VNet with default settings, accept the defaults, and then select Next
âÃÂâ None To deploy into an existing network, select Use existing VNet and Subnets, and then:
âÃÂâ Select the Resource Group option that contains your virtual network
âÃÂâ Choose the Virtual Network name you want to deploy into
âÃÂâ Select the correct Subnet values for each of the required role subnets
âÃÂâ None Enter the info for your file share and then select Next. The address of the file share must use the Fully Qualified Domain Name (FQDN) or IP address of your file server. For example: ppservicefileserver.local.cloudapp.azurestack.external\websites, or .0.0.1\websites. If you're using a file server that's domain-joined, you must provide the full user name, including the domain. For example: . The installer tries to test connectivity to the file share before proceeding. However, if you choose to deploy into an existing virtual network, the installer might be unable to connect to the file share and displays a warning asking whether you want to continue. Verify the file share info and continue if it's correct
âÃÂâ
âÃÂâ In the Identity Application ID box, enter the GUID for the Identity application you created as part of the pre-requisites
âÃÂâ In the Identity Application certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ In the Identity Application certificate password box, enter the password for the certificate. This password is the one that you made note of when you used the script to create the certificates
âÃÂâ In the Azure Resource Manager root certificate file box, enter (or browse to) the location of the certificate file
âÃÂâ None For each of the three certificate file boxes, select Browse and navigate to the appropriate certificate file. You must provide the password for each certificate. These certificates are the ones that you created in Prerequisites for deploying App Service on Azure Stack Hub. Select Next after entering all the information. If you used a different domain suffix when you created the certificates, your certificate file names don't use local.AzureStack.external. Instead, use your custom domain info
âÃÂâ None Enter the SQL Server details for the server instance used to host the Azure App Service resource provider databases, and then select Next. The installer validates the SQL connection properties. You must enter either the internal IP or the FQDN for the SQL Server name. The installer tries to test connectivity to the computer running SQL Server before proceeding. However, if you chose to deploy into an existing virtual network, the installer might not be able to connect to the computer running SQL Server and displays a warning asking whether you want to continue. Verify the SQL Server info and continue if it's correct. From Azure App Service on Azure Stack Hub 1.3 onward, the installer checks that the computer running SQL Server has database containment enabled at the SQL Server level. If it doesn't, you're prompted with the following exception: Enable contained database authentication for SQL server by running below command on SQL server (Ctrl+C to copy)sp_configure 'contained database authentication', 1; GO RECONFIGURE; GOFor more information, see the release notes for Azure App Service on Azure Stack Hub 1.3
âÃÂâ None Review the role instance and SKU options. The defaults populate with the minimum number of instances and the minimum SKU for each role in a production deployment. For ASDK deployment, you can scale the instances down to lower SKUs to reduce the core and memorybut you will experience a performance degradation. A summary of vCPU and memory requirements is provided to help plan your deployment. After you make your selections, select Next. For production deployments, follow the guidance in Capacity planning for Azure App Service server roles in Azure Stack Hub. Manages and maintains the health of the App Service cloud. Manages the App Service Azure Resource Manager and API endpoints, portal extensions (admin, tenant, Functions portal), and the data service. To support failover, increase the recommended instances to 2. Hosts web or API apps and Azure Functions apps. You might want to add more instances. As an operator, you can define your offering and choose any SKU tier. The tiers must have a minimum of one vCPU
âÃÂâ None In the Select Platform Image box, choose your deployment Windows Server 2016 virtual machine (VM) image from the images available on the compute resource provider for the Azure App Service cloud. Select Next. Windows Server 2016 Core is not a supported platform image for use with Azure App Service on Azure Stack Hub. Don't use evaluation images for production deployments. Azure App Service on Azure Stack Hub requires that Microsoft .NET 3.5.1 SP1 be activated on the image used for deployment. Marketplace-syndicated Windows Server 2016 images don't have this feature enabled. Therefore, you must create and use a Windows Server 2016 image with this feature pre-enabled. See Add a custom VM image to Azure Stack Hub for details on creating a custom image and adding to Marketplace. Be sure to specify the following when adding the image to Marketplace:
âÃÂâ
âÃÂâ Enter the Worker Role VM admin user name and password
âÃÂâ Enter the Other Roles VM admin user name and password
âÃÂâ
âÃÂâ Verify the selections you made. To make changes, use the Previous buttons to visit previous pages
âÃÂâ If the configurations are correct, select the check box
âÃÂâ To start the deployment, select Next
âÃÂâ
âÃÂâ None Track the installation progress. App Service on Azure Stack Hub can take up to 240 minutes to deploy based on the default selections and age of the base Windows 2016 Datacenter image. If you've provided the Azure App Service RP with a SQL Always On Instance, you must add the appservice_hosting and appservice_metering databases to an availability group. You must also synchronize the databases to prevent any loss of service in the event of a database failover. If you chose to deploy into an existing virtual network and an internal IP address to connect to your file server, you must add an outbound security rule, enabling SMB traffic between the worker subnet and the file server. In the administrator portal, go to the WorkersNsg Network Security Group and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your file server To remove latency when workers are communicating with the file server we also advise adding the following rule to the Worker NSG to allow outbound LDAP and Kerberos traffic to your Active Directory Controllers if securing the file server using Active Directory, for example if you have used the Quickstart template to deploy a HA File Server and SQL Server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
âÃÂâ Destination IP address range: Range of IPs for your AD Servers, for example with the Quickstart template 10.0.0.100, 10.0.0.101
âÃÂâ None In the Azure Stack Hub administrator portal, go to Administration - App Service
âÃÂâ None In the overview, under status, check to see that the Status displays All roles are ready. After you deploy and register the Azure App Service resource provider, test it to make sure that users can deploy web and API apps. You must create an offer that has the Microsoft.Web namespace within the plan. Then, you need to have a tenant subscription that subscribes to this offer. For more info, see Create offer and Create plan. You must have a tenant subscription to create apps that use Azure App Service on Azure Stack Hub. The only capabilities that a service admin can complete within the administrator portal are related to the resource provider administration of Azure App Service. These capabilities include adding capacity, configuring deployment sources, and adding Worker tiers and SKUs. As of the third technical preview, to create web, API, and Azure Functions apps, you must use the user portal and have a tenant subscription
âÃÂâ None On the Web App blade, type a name in the Web app box
âÃÂâ None Under Resource Group, select New. Type a name in the Resource Group box
âÃÂâ None On the App Service plan blade, type a name in the App Service plan box
âÃÂâ None In less than a minute, a tile for the new web app appears on the dashboard. Select the tile
âÃÂâ None On the Web App blade, select Browse to view the default website for this app
âÃÂâ None In the Azure Stack Hub user portal, select +, go to Azure Marketplace, deploy a Django website, and wait for successful completion. The Django web platform uses a file system-based database. It doesn't require any additional resource providers, such as SQL or MySQL
âÃÂâ None If you also deployed a MySQL resource provider, you can deploy a WordPress website from Azure Marketplace. When you're prompted for database parameters, enter the user name as User1@Server1, with the user name and server name of your choice
âÃÂâ None If you also deployed a SQL Server resource provider, you can deploy a DNN website from Azure Marketplace. When you're prompted for database parameters, choose a database on the computer running SQL Server that's connected to your resource provider
Prepare for additional admin operations for App Service on Azure Stack Hub: