You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

110 lines
5.6 KiB

7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
  1. # Deploying a Service Fabric cluster based on Windows nodes
  2. ## A. Unsecured cluster (SF Windows cluster)
  3. For a secured cluster, see option B. below.
  4. You can always deploy a SF cluster through the Azure portal, as explained in this article: https://docs.microsoft.com/en-us/azure/service-fabric/service-fabric-get-started-azure-cluster
  5. However, when creating a cluster, there are quite a few configurations to take into account, like enabling the internal DNS service or Reverse Proxy service, choosing between Linux/Windows, open/publish your application ports in the load-balancer and most of all (the most complex setup) how to create a secure cluster.
  6. Because of those reasons, we have created a set of ARM templates and scripts so you can create, re-create and configure the SF clusters much faster, as explained below:
  7. Within eShopOnContainers root folder, at the folder [..\deploy\az\servicefabric\WindowsContainers](https://github.com/dotnet-architecture/eShopOnContainers/tree/dev/deploy/az/servicefabric/WindowsContainers), you can find the ARM template `servicefabricdeploy.json` and its parameters file (`servicefabricdeploy.parameters.json`) to create a Service Fabric cluster environment for Windows Containers (NOT SECURED CLUSTER).
  8. ## Edit the servicefabricdeploy.parameters.json file
  9. Edit the following params in `servicefabricdeploy.parameters.json` file to set your values:
  10. - clusterName: Name of your SF cluster
  11. - clusterLocation: Datacenter location, like westus or westeurope
  12. - computeLocation: Datacenter location, like westus or westeurope
  13. - adminUserName: user-name for VMs administration
  14. - adminPassword: user-password for VMs administration
  15. - dnsName: Name assigned to your SF dns
  16. Optionally, you could modify which ports are opened in the LoadBalancer for the multiple eShopOnContainer apps and API services.
  17. By default, they are setup as:
  18. - webMvcHttpPort: 5100
  19. - webSpaHttpPort: 5104
  20. - webStatusHttpPort: 5107
  21. - IdSrvHttpRule: 5105
  22. - BasketApiHttpRule: 5103
  23. - CatalogApiHttpRule: 5101
  24. - OrderingApiHttpRule: 5102
  25. - MarketingApiHttpRule: 5110
  26. - LocationsApiHttpRule: 5109
  27. ## Deploy the Service Fabric cluster using the script and ARM templates
  28. Once parameter file is edited you can deploy it using [create-resources script](../readme.md).
  29. For example, to deploy the cluster to a new resourcegroup located in westus, using the Command Prompt, go to `deploy\az` folder and type:
  30. ```
  31. create-resources.cmd servicefabric\WindowsContainers\servicefabricdeploy qa-eshop-sfwin-resgrp -c westus
  32. ```
  33. You should see a similar execution to the following:
  34. ++++++++++++ IMAGE TBD ++++++++++++++
  35. Now, if you go to your subscription in Azure, you should be able to see the SF cluster already created and available, like in the following image:
  36. ++++++++++++ IMAGE TBD ++++++++++++++
  37. In this case, this is an unsecured SF cluster with a single Windows node, good for initial tests and getting started with SF.
  38. ## B. Secured cluster (SF Windows cluster)
  39. Within eShopOnContainers root folder, at the folder [..\deploy\az\servicefabric\WindowsContainers](https://github.com/dotnet-architecture/eShopOnContainers/tree/dev/deploy/az/servicefabric/WindowsContainers), you can find the ARM template `servicefabricdeploysecured.json` and its parameter file (`servicefabricdeploysecured.parameters.json`) to create a secured Service Fabric cluster environment for Windows Containers (IN THIS CASE, IT IS A SECURED CLUSTER USING A CERTIFICATE).
  40. ## Create Azure Keyvault service
  41. Go to PortalAzure and create a Keyvault service. Make sure Enable access for deployment checkboxes are selected.
  42. <img src="../../../../img/sf/create-kv.PNG">
  43. ## Generate a certificate in Azure Keyvault
  44. Execute the gen-keyvaultcert.ps1 script to generate and download a certificate from Keyvault.
  45. ```
  46. .\gen-keyvaultcert.ps1 -vaultName <your_keyvault_service> -certName <your_cert_name> -certPwd <your_cert_pwd> -subjectName CN=<your_sf_dns_name>.westeurope.cloudapp.azure.com -saveDir C:\Users\<user>\Downloads
  47. ```
  48. ## Install the certificate
  49. Install the certificate under 'Current User' store location and check it as exportable.
  50. <img src="../../../../img/sf/install-cert.PNG">
  51. ## Editing servicefabricdeploysecured.parameters.json file
  52. Edit the following params in `servicefabricdeploysecured.parameters.json` file to set your values:
  53. - clusterName: Name of your SF cluster
  54. - dnsName: Name assigned to your SF dns
  55. - adminUserName: user name for administration
  56. - adminPassword: user password for administration
  57. - sourceVaultValue: keyvault resource id (check azure keyvault properties)
  58. - certificateUrlValue: certificate url (check azure Keyvault certificate properties)
  59. - certificateThumbprint: certificate thumbprint (check azure Keyvault certificate properties)
  60. Optionally, you can modify which ports are opened in the LoadBalancer for accessing externally to the apps:
  61. - webMvcHttpPort: port externally exposed for the WebMVC app
  62. - webSpaHttpPort: port externally exposed for the WebSPA app
  63. - webStatusHttpPort: port externally exposed for the WebStatus app
  64. - IdSrvHttpRule: port externally exposed for the Identity app
  65. ## Deploy the template
  66. Once parameter file is edited you can deploy it using [create-resources script](../readme.md).
  67. ```
  68. create-resources.cmd servicefabric\WindowsContainers\servicefabricdeploysecured newResourceGroup -c westus
  69. ```
  70. ## Deploy eShopOnServiceFabric with Visual Studio.
  71. Modify the cloud.xml file of each Service Fabric application in PublishProfile directory and set your certificate settings to be able to deploy eshopOnContainers in the secured cluster:
  72. <img src="../../../../img/sf/cloud_publishProfile.PNG">