Skip to content

Commit 154ec52

Browse files
authored
Merge pull request #94253 from Nickomang/smbportupdate
Revert "updated SMB port requirements"
2 parents 0b81fd6 + 495072a commit 154ec52

5 files changed

+50
-7
lines changed

articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,9 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
9898
* Have Service Fabric runtime uninstalled
9999
* Have the Windows Firewall service (mpssvc) enabled
100100
* Have the Remote Registry Service (remote registry) enabled
101+
* Have file sharing (SMB) enabled
101102
* Have necessary ports opened, based on cluster configuration ports
102-
* Have necessary ports opened for Remote Registry service: 135, 137, 138, and 139
103+
* Have necessary ports opened for Windows SMB and Remote Registry service: 135, 137, 138, 139, and 445
103104
* Have network connectivity to one another
104105
3. None of the cluster node machines should be a Domain Controller.
105106
4. If the cluster to be deployed is a secure cluster, validate the necessary security prerequisites are in place, and are configured correctly against the configuration.

articles/service-fabric/service-fabric-tutorial-create-vnet-and-windows-cluster.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,7 @@ The following inbound traffic rules are enabled in the **Microsoft.Network/netwo
107107

108108
* ClientConnectionEndpoint (TCP): 19000
109109
* HttpGatewayEndpoint (HTTP/TCP): 19080
110+
* SMB: 445
110111
* Internodecommunication: 1025, 1026, 1027
111112
* Ephemeral port range: 49152 to 65534 (need a minimum of 256 ports).
112113
* Ports for application use: 80 and 443

articles/service-fabric/service-fabric-tutorial-scale-cluster.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -382,6 +382,20 @@ In the *template.json* file, add new network security group and virtual machine
382382
},
383383
"properties": {
384384
"securityRules": [
385+
{
386+
"name": "allowSvcFabSMB",
387+
"properties": {
388+
"access": "Allow",
389+
"destinationAddressPrefix": "*",
390+
"destinationPortRange": "445",
391+
"direction": "Inbound",
392+
"priority": 3950,
393+
"protocol": "*",
394+
"sourceAddressPrefix": "VirtualNetwork",
395+
"sourcePortRange": "*",
396+
"description": "allow SMB traffic within the net, used by fabric to move packages around"
397+
}
398+
},
385399
{
386400
"name": "allowSvcFabCluser",
387401
"properties": {

articles/service-fabric/service-fabric-tutorial-standalone-azure-create-infrastructure.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,12 +85,18 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
8585

8686
4. Open the RDP file, and when prompted enter the username and password you provided in the VM setup.
8787

88-
5. Once you are connected to an instance, you need to validate that remote registry was running and open the requisite ports.
88+
5. Once you are connected to an instance, you need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
89+
90+
To enable SMB, this is the PowerShell command:
91+
92+
```powershell
93+
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
94+
```
8995

9096
6. To open the ports in the firewall here is the PowerShell command:
9197

9298
```powershell
93-
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139
99+
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139, 445
94100
```
95101

96102
7. Repeat this process for your other instances, again noting the private IP addresses.
@@ -107,6 +113,15 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
107113

108114
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
109115

116+
3. Now validate that your SMB sharing works with the following command:
117+
118+
```
119+
net use * \\172.31.20.163\c$
120+
```
121+
122+
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
123+
124+
110125
Now your instances are properly prepared for Service Fabric.
111126

112127
## Next steps

articles/service-fabric/service-fabric-tutorial-standalone-create-infrastructure.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Service Fabric requires a number of ports open between the hosts in your cluster
7777

7878
To avoid opening these ports to the world, you instead open them only for hosts in the same security group. Take note of the security group ID, in the example it's **sg-c4fb1eba**. Then select **Edit**.
7979

80-
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable Remote Registry.
80+
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable SMB and Remote Registry.
8181

8282
For the first rule select **Add Rule**, then from the dropdown menu selects **All ICMP - IPv4**. Select the entry box next to custom and enter your security group ID from above.
8383

@@ -113,18 +113,30 @@ To validate that basic connectivity works, use the ping command.
113113
ping 172.31.20.163
114114
```
115115

116-
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
116+
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working. Now validate that your SMB sharing works with the following command:
117+
118+
```
119+
net use * \\172.31.20.163\c$
120+
```
121+
122+
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
117123

118124
## Prep instances for Service Fabric
119125

120-
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running and open the requisite ports.
126+
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
121127

122128
To make it easier you embedded all of this work when you bootstrapped the instances with your user data script.
123129

130+
To enable SMB, this is the PowerShell command you used:
131+
132+
```powershell
133+
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
134+
```
135+
124136
To open the ports in the firewall here is the PowerShell command:
125137

126138
```powershell
127-
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139
139+
New-NetFirewallRule -DisplayName "Service Fabric Ports" -Direction Inbound -Action Allow -RemoteAddress LocalSubnet -Protocol TCP -LocalPort 135, 137-139, 445
128140
```
129141

130142
## Next steps

0 commit comments

Comments
 (0)