You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| PowerShell Core | To run PowerShell runbooks, PowerShell needs to be installed, see [Installing PowerShell Core on Linux](/powershell/scripting/setup/installing-powershell-core-on-linux) to learn how to install it. | 6.0.0 |
51
+
| PowerShell Core | To run PowerShell runbooks, PowerShell needs to be installed, see [Installing PowerShell Core on Linux](/powershell/scripting/install/installing-powershell-core-on-linux) to learn how to install it. | 6.0.0 |
52
52
53
53
### Installation
54
54
@@ -101,7 +101,7 @@ The following runbook types work on a Linux Hybrid Worker:
101
101
* PowerShell
102
102
103
103
> [!NOTE]
104
-
> PowerShell runbooks require PowerShell Core to be installed on the Linux machine. See [Installing PowerShell Core on Linux](/powershell/scripting/setup/installing-powershell-core-on-linux) to learn how to install it.
104
+
> PowerShell runbooks require PowerShell Core to be installed on the Linux machine. See [Installing PowerShell Core on Linux](/powershell/scripting/install/installing-powershell-core-on-linux) to learn how to install it.
105
105
106
106
The following runbook types don't work on a Linux Hybrid Worker:
# Get shared access signature URI for your VM image
14
14
15
-
During the publishing process, you must provide a uniform resource identifier (URI) for each virtual hard disk (VHD) associated with your SKUs. Microsoft needs access to these VHDs during the certification process. This article explains how to generate a shared access signature (SAS) URI for each VHD. You will enter this URI in the **SKUs** tab in the Cloud Partner Portal.
15
+
During the publishing process, you must provide a uniform resource identifier (URI) for each virtual hard disk (VHD) associated with your SKUs. Microsoft needs access to these VHDs during the certification process. This article explains how to generate a shared access signature (SAS) URI for each VHD. You will enter this URI in the **SKUs** tab in the Cloud Partner Portal.
16
16
17
17
When generating SAS URIs for your VHDs, adhere to the following requirements:
18
18
@@ -33,35 +33,35 @@ The SAS URL can be generated in two common ways using the following tools:
33
33
34
34
Use the following steps to generate a SAS URI with Azure CLI.
35
35
36
-
1. Download and install the [Microsoft Azure CLI](https://azure.microsoft.com/documentation/articles/xplat-cli-install/). Versions are available for Windows, macOS, and various distros of Linux.
36
+
1. Download and install the [Microsoft Azure CLI](https://azure.microsoft.com/documentation/articles/xplat-cli-install/). Versions are available for Windows, macOS, and various distros of Linux.
37
37
2. Create a PowerShell file (`.ps1` file extension), copy in the following code, then save it locally.
5. Run this script, using administrative privileges, to generate a *SAS connection string* for container level access. You can use two basic approaches:
58
58
- Run the script from the console. For example, in Windows, write-click on the script and select **Run as administrator**.
59
-
- Run the script from a PowerShell script editor, such as the [Windows PowerShell ISE](https://docs.microsoft.com/powershell/scripting/core-powershell/ise/introducing-the-windows-powershell-ise), using administrative privileges.
60
-
The following demonstrates a SAS connection string being generated within this editor.
59
+
- Run the script from a PowerShell script editor, such as the [Windows PowerShell ISE](https://docs.microsoft.com/powershell/scripting/components/ise/introducing-the-windows-powershell-ise), using administrative privileges.
60
+
The following demonstrates a SAS connection string being generated within this editor.
61
61
62
62

63
63
64
-
6. Copy the resulting SAS connection string and save it to a text file in a secure location. You will edit this string to add the associated VHD location information to it to create the final SAS URI.
64
+
6. Copy the resulting SAS connection string and save it to a text file in a secure location. You will edit this string to add the associated VHD location information to it to create the final SAS URI.
65
65
7. In the Azure portal, navigate to the blob storage that contains the VHD associated with the newly generated URI.
66
66
8. Copy the URL value of the **Blob service endpoint**, as shown below.
67
67
@@ -86,19 +86,19 @@ Use the following steps to generate a SAS URI with the Microsoft Azure Storage E
86
86
2. Open the explorer and, in the left-hand menubar, click on the **Add Account** icon. The **Connect to Azure Storage** dialog box is displayed.
87
87
3. Select **Add an Azure Account** and click **Sign in**. Continue the required steps to sign into your Azure account.
88
88
4. In the left-hand **Explorer** pane, navigate to your **Storage Accounts** and expand this node.
89
-
5. Right-click on your VHD and select **Get Share Access Signature** from the context menu.
89
+
5. Right-click on your VHD and select **Get Share Access Signature** from the context menu.
90
90
91
91

92
92
93
93
6. The **Shared Access Signature** dialog is displayed. Enter values for the following fields:
94
94
-**Start time** - Permission start date for VHD access. Provide a date that is one day before the current date.
95
95
-**Expiry time** - Permission expiration date for VHD access. Provide a date at least three weeks beyond the current date.
96
-
-**Permissions** - Select the `Read` and `List` permissions.
96
+
-**Permissions** - Select the `Read` and `List` permissions.
97
97
98
98

99
99
100
-
7. Click **Create** to create the associated SAS URI for this VHD. The dialog now displays details about this operation.
101
-
8. Copy the **URL** value and save it to a text file in a secure location.
100
+
7. Click **Create** to create the associated SAS URI for this VHD. The dialog now displays details about this operation.
101
+
8. Copy the **URL** value and save it to a text file in a secure location.
102
102
103
103

This section explains how to configure an Azure-hosted, Windows-based VM so that it can be managed and deployed remotely with PowerShell. To enable PowerShell remoting, the target VM must expose a Windows Remote Management (WinRM) HTTPS endpoint. For more information about PowerShell remoting, see [Running Remote Commands](https://docs.microsoft.com/powershell/scripting/core-powershell/running-remote-commands?view=powershell-6). For more information about WinRM, see [Windows Remote Management](https://docs.microsoft.com/windows/desktop/WinRM/portal).
15
+
This section explains how to configure an Azure-hosted, Windows-based VM so that it can be managed and deployed remotely with PowerShell. To enable PowerShell remoting, the target VM must expose a Windows Remote Management (WinRM) HTTPS endpoint. For more information about PowerShell remoting, see [Running Remote Commands](https://docs.microsoft.com/powershell/scripting/learn/remoting/running-remote-commands). For more information about WinRM, see [Windows Remote Management](https://docs.microsoft.com/windows/desktop/WinRM/portal).
16
16
17
-
If you created a VM using one of the "classic" Azure approaches—either the Azure Service Manager Portal or the deprecated [Azure Service Management API](https://docs.microsoft.com/previous-versions/azure/ee460799(v=azure.100))—then it is automatically configured with a WinRM endpoint. However, if you create a VM using any of the following "modern" Azure approaches, then your VM will *not* be configured for WinRM over HTTPS.
17
+
If you created a VM using one of the "classic" Azure approaches—either the Azure Service Manager Portal or the deprecated [Azure Service Management API](https://docs.microsoft.com/previous-versions/azure/ee460799(v=azure.100))—then it is automatically configured with a WinRM endpoint. However, if you create a VM using any of the following "modern" Azure approaches, then your VM will *not* be configured for WinRM over HTTPS.
18
18
19
19
- Using the [Azure portal](https://portal.azure.com/), typically from an approved base, as described in the section [Create an Azure-compatible VHD](https://docs.microsoft.com/azure/marketplace/cloud-partner-portal/virtual-machine/cpp-create-vhd)
20
20
-[Using the Azure Resource Manager templates](https://docs.microsoft.com/azure/virtual-machines/windows/ps-template)
@@ -29,9 +29,9 @@ In contrast, typically Linux VMs are remotely managed using either [Azure CLI](h
29
29
30
30
The WinRM endpoint for a windows-based VM can be configured during two different stages of its development:
31
31
32
-
- During creation - during the deployment of a VM to an existing VHD. This is the preferred approach for new offers. This approach requires the creation of an Azure certificate, using supplied Azure Resource Manager templates, and running customized PowerShell scripts.
33
-
- After deployment - on an existing VM hosted on Azure. Use this approach if you already have a VM solution deployed on Azure, and need to enable Window Remote Management for it. This approach requires manual changes in the Azure portal and the execution of a script on the target VM.
32
+
- During creation - during the deployment of a VM to an existing VHD. This is the preferred approach for new offers. This approach requires the creation of an Azure certificate, using supplied Azure Resource Manager templates, and running customized PowerShell scripts.
33
+
- After deployment - on an existing VM hosted on Azure. Use this approach if you already have a VM solution deployed on Azure, and need to enable Window Remote Management for it. This approach requires manual changes in the Azure portal and the execution of a script on the target VM.
34
34
35
35
36
36
## Next steps
37
-
If you are creating a new VM, you can enable WinRM during [deployment of your VM from its VHDs](./cpp-deploy-vm-vhd.md). Otherwise, WinRM can be enabled in an existing VM
37
+
If you are creating a new VM, you can enable WinRM during [deployment of your VM from its VHDs](./cpp-deploy-vm-vhd.md). Otherwise, WinRM can be enabled in an existing VM
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Azure Service Fabric Standalone Cluster Deployment Preparation | Microsoft Docs
3
-
description: Documentation related to preparing the environment and creating the cluster configuration, to be considered prior to deploying a cluster intended for handling a production workload.
3
+
description: Documentation related to preparing the environment and creating the cluster configuration, to be considered prior to deploying a cluster intended for handling a production workload.
4
4
services: service-fabric
5
5
documentationcenter: .net
6
6
author: dkkapur
@@ -63,7 +63,7 @@ Here are some recommended specs for each machine that you want to add to the clu
63
63
* Connectivity to a secure network or networks for all machines
64
64
* Windows Server OS installed (valid versions: 2012 R2, 2016, 1709, or 1803). Service Fabric version 6.4.654.9590 and later also supports Server 2019 and 1809.
65
65
*[.NET Framework 4.5.1 or higher](https://www.microsoft.com/download/details.aspx?id=40773), full install
* The [RemoteRegistry service](https://technet.microsoft.com/library/cc754820) should be running on all the machines
68
68
* Service Fabric installation drive must be NTFS File System
69
69
@@ -95,7 +95,7 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
95
95
1. The user creating the cluster should have administrator-level security privileges to all machines that are listed as nodes in the cluster configuration file.
96
96
2. Machine from which the cluster is created, as well as each cluster node machine must:
97
97
* Have Service Fabric SDK uninstalled
98
-
* Have Service Fabric runtime uninstalled
98
+
* Have Service Fabric runtime uninstalled
99
99
* Have the Windows Firewall service (mpssvc) enabled
100
100
* Have the Remote Registry Service (remote registry) enabled
101
101
* Have file sharing (SMB) enabled
@@ -139,7 +139,7 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
139
139
| FileStoreService.exe |
140
140
141
141
## Validate environment using TestConfiguration script
142
-
The TestConfiguration.ps1 script can be found in the standalone package. It is used as a Best Practices Analyzer to validate some of the criteria above and should be used as a sanity check to validate whether a cluster can be deployed on a given environment. If there is any failure, refer to the list under [Environment Setup](service-fabric-cluster-standalone-deployment-preparation.md) for troubleshooting.
142
+
The TestConfiguration.ps1 script can be found in the standalone package. It is used as a Best Practices Analyzer to validate some of the criteria above and should be used as a sanity check to validate whether a cluster can be deployed on a given environment. If there is any failure, refer to the list under [Environment Setup](service-fabric-cluster-standalone-deployment-preparation.md) for troubleshooting.
143
143
144
144
This script can be run on any machine that has administrator access to all the machines that are listed as nodes in the cluster configuration file. The machine that this script is run on does not have to be part of the cluster.
145
145
@@ -162,12 +162,12 @@ FabricInstallable : True
162
162
Passed : True
163
163
```
164
164
165
-
Currently this configuration testing module does not validate the security configuration so this has to be done independently.
165
+
Currently this configuration testing module does not validate the security configuration so this has to be done independently.
166
166
167
167
> [!NOTE]
168
-
> We are continually making improvements to make this module more robust, so if there is a faulty or missing case which you believe isn't currently caught by TestConfiguration, please let us know through our [support channels](https://docs.microsoft.com/azure/service-fabric/service-fabric-support).
169
-
>
170
-
>
168
+
> We are continually making improvements to make this module more robust, so if there is a faulty or missing case which you believe isn't currently caught by TestConfiguration, please let us know through our [support channels](https://docs.microsoft.com/azure/service-fabric/service-fabric-support).
169
+
>
170
+
>
171
171
172
172
## Next steps
173
173
*[Create a standalone cluster running on Windows Server](service-fabric-cluster-creation-for-windows-server.md)
0 commit comments