You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,8 +98,9 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
98
98
* Have Service Fabric runtime uninstalled
99
99
* Have the Windows Firewall service (mpssvc) enabled
100
100
* Have the Remote Registry Service (remote registry) enabled
101
+
* Have file sharing (SMB) enabled
101
102
* Have necessary ports opened, based on cluster configuration ports
102
-
* Have necessary ports opened for Remote Registry service: 135, 137, 138, and 139
103
+
* Have necessary ports opened for Windows SMB and Remote Registry service: 135, 137, 138, 139, and 445
103
104
* Have network connectivity to one another
104
105
3. None of the cluster node machines should be a Domain Controller.
105
106
4. If the cluster to be deployed is a secure cluster, validate the necessary security prerequisites are in place, and are configured correctly against the configuration.
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-tutorial-standalone-azure-create-infrastructure.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,12 +85,18 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
85
85
86
86
4. Open the RDP file, and when prompted enter the username and password you provided in the VM setup.
87
87
88
-
5. Once you are connected to an instance, you need to validate that remote registry was running and open the requisite ports.
88
+
5. Once you are connected to an instance, you need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
89
+
90
+
To enable SMB, this is the PowerShell command:
91
+
92
+
```powershell
93
+
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
94
+
```
89
95
90
96
6. To open the ports in the firewall here is the PowerShell command:
7. Repeat this process for your other instances, again noting the private IP addresses.
@@ -107,6 +113,15 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
107
113
108
114
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
109
115
116
+
3. Now validate that your SMB sharing works with the following command:
117
+
118
+
```
119
+
net use * \\172.31.20.163\c$
120
+
```
121
+
122
+
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
123
+
124
+
110
125
Now your instances are properly prepared for Service Fabric.
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-tutorial-standalone-create-infrastructure.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ Service Fabric requires a number of ports open between the hosts in your cluster
77
77
78
78
To avoid opening these ports to the world, you instead open them only for hosts in the same security group. Take note of the security group ID, in the example it's **sg-c4fb1eba**. Then select **Edit**.
79
79
80
-
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable Remote Registry.
80
+
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable SMB and Remote Registry.
81
81
82
82
For the first rule select **Add Rule**, then from the dropdown menu selects **All ICMP - IPv4**. Select the entry box next to custom and enter your security group ID from above.
83
83
@@ -113,18 +113,30 @@ To validate that basic connectivity works, use the ping command.
113
113
ping 172.31.20.163
114
114
```
115
115
116
-
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
116
+
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working. Now validate that your SMB sharing works with the following command:
117
+
118
+
```
119
+
net use * \\172.31.20.163\c$
120
+
```
121
+
122
+
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
117
123
118
124
## Prep instances for Service Fabric
119
125
120
-
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was runningand open the requisite ports.
126
+
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
121
127
122
128
To make it easier you embedded all of this work when you bootstrapped the instances with your user data script.
123
129
130
+
To enable SMB, this is the PowerShell command you used:
131
+
132
+
```powershell
133
+
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
134
+
```
135
+
124
136
To open the ports in the firewall here is the PowerShell command:
0 commit comments