You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,9 +98,8 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
98
98
* Have Service Fabric runtime uninstalled
99
99
* Have the Windows Firewall service (mpssvc) enabled
100
100
* Have the Remote Registry Service (remote registry) enabled
101
-
* Have file sharing (SMB) enabled
102
101
* Have necessary ports opened, based on cluster configuration ports
103
-
* Have necessary ports opened for Windows SMB and Remote Registry service: 135, 137, 138, 139, and 445
102
+
* Have necessary ports opened for Remote Registry service: 135, 137, 138, and 139
104
103
* Have network connectivity to one another
105
104
3. None of the cluster node machines should be a Domain Controller.
106
105
4. If the cluster to be deployed is a secure cluster, validate the necessary security prerequisites are in place, and are configured correctly against the configuration.
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-tutorial-standalone-azure-create-infrastructure.md
+2-17Lines changed: 2 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,18 +85,12 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
85
85
86
86
4. Open the RDP file, and when prompted enter the username and password you provided in the VM setup.
87
87
88
-
5. Once you are connected to an instance, you need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
89
-
90
-
To enable SMB, this is the PowerShell command:
91
-
92
-
```powershell
93
-
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
94
-
```
88
+
5. Once you are connected to an instance, you need to validate that remote registry was running and open the requisite ports.
95
89
96
90
6. To open the ports in the firewall here is the PowerShell command:
7. Repeat this process for your other instances, again noting the private IP addresses.
@@ -113,15 +107,6 @@ Launch two more **Virtual Machines**, being sure to maintain the same settings o
113
107
114
108
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
115
109
116
-
3. Now validate that your SMB sharing works with the following command:
117
-
118
-
```
119
-
net use * \\172.31.20.163\c$
120
-
```
121
-
122
-
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
123
-
124
-
125
110
Now your instances are properly prepared for Service Fabric.
Copy file name to clipboardExpand all lines: articles/service-fabric/service-fabric-tutorial-standalone-create-infrastructure.md
+4-16Lines changed: 4 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ Service Fabric requires a number of ports open between the hosts in your cluster
77
77
78
78
To avoid opening these ports to the world, you instead open them only for hosts in the same security group. Take note of the security group ID, in the example it's **sg-c4fb1eba**. Then select **Edit**.
79
79
80
-
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable SMB and Remote Registry.
80
+
Next, add four rules to the security group for service dependencies, and then three more for Service Fabric itself. The first rule is to allow ICMP traffic, for basic connectivity checks. The others rules open the required ports to enable Remote Registry.
81
81
82
82
For the first rule select **Add Rule**, then from the dropdown menu selects **All ICMP - IPv4**. Select the entry box next to custom and enter your security group ID from above.
83
83
@@ -113,30 +113,18 @@ To validate that basic connectivity works, use the ping command.
113
113
ping 172.31.20.163
114
114
```
115
115
116
-
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working. Now validate that your SMB sharing works with the following command:
117
-
118
-
```
119
-
net use * \\172.31.20.163\c$
120
-
```
121
-
122
-
It should return `Drive Z: is now connected to \\172.31.20.163\c$.` as the output.
116
+
If your output looks like `Reply from 172.31.20.163: bytes=32 time<1ms TTL=128` repeated four times then your connection between the instances is working.
123
117
124
118
## Prep instances for Service Fabric
125
119
126
-
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was running, enable SMB, and open the requisite ports for SMB and remote registry.
120
+
If you were creating this from scratch, you'd need to take a couple extra steps. Namely, you'd need to validate that remote registry was runningand open the requisite ports.
127
121
128
122
To make it easier you embedded all of this work when you bootstrapped the instances with your user data script.
129
123
130
-
To enable SMB, this is the PowerShell command you used:
131
-
132
-
```powershell
133
-
netsh advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes
134
-
```
135
-
136
124
To open the ports in the firewall here is the PowerShell command:
0 commit comments