├── .github
├── ISSUE_TEMPLATE.md
└── PULL_REQUEST_TEMPLATE.md
├── .gitignore
├── 10-VM-2-NodeTypes-Windows-Stateless-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 10-VM-Ubuntu-2-NodeType-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
└── README.md
├── 10-VM-Windows-2-NodeType-Secure
├── AzureDeploy.Parameters.json
└── AzureDeploy.json
├── 15-VM-2-NodeTypes-Windows-Stateless-CrossAZ-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 15-VM-Windows-Cross-AZ-Secure-UD-Override
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 15-VM-Windows-Cross-AZ-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 15-VM-Windows-Multiple-AZ-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 5-VM-RHEL-1-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
└── metadata.json
├── 5-VM-Ubuntu-1-NodeType-Secure-OMS
├── 5-VM-Ubuntu-1-NodeType-Secure-OMS.json
└── 5-VM-Ubuntu-1-NodeType-Secure-OMS.parameters.json
├── 5-VM-Ubuntu-1-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
├── metadata.json
└── new-service-fabric-cluster-certificate.sh
├── 5-VM-Ubuntu-1804-1-NodeType-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
└── new-service-fabric-cluster-certificate.sh
├── 5-VM-Windows-1-NodeTypes-Secure-ILB
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── README.md
└── metadata.json
├── 5-VM-Windows-1-NodeTypes-Secure-NSG
├── DownloadCert.PNG
├── DownloadTemplate.png
├── NSG1.PNG
├── NSG2.PNG
├── NSG3.PNG
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── 5-VM-Windows-1-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
└── metadata.json
├── 5-VM-Windows-OMS-UnSecure
├── README.md
└── sfclusteroms.json
├── 7-VM-Ubuntu-1804-3-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 7-VM-Ubuntu-2004-3-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── README.md
└── metadata.json
├── 7-VM-Ubuntu-3-NodeTypes-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
└── metadata.json
├── 7-VM-Windows-3-NodeTypes-Secure-NSG
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
├── DownloadCert.PNG
├── DownloadTemplate.png
├── NSG1.PNG
├── NSG2.PNG
├── NSG3.PNG
├── New-ServiceFabricClusterCertificate.ps1
├── README.md
└── metadata.json
├── CHANGELOG.md
├── CONTRIBUTING.md
├── Cert-Rollover-Sample
├── 5-VM-1-NodeTypes-Secure.parameters_Step1.json
├── 5-VM-1-NodeTypes-Secure.parameters_Step2.json
├── 5-VM-1-NodeTypes-Secure_Step1.json
├── 5-VM-1-NodeTypes-Secure_Step2.json
└── README.md
├── LICENSE.md
├── Primary-NodeType-Scaling-Sample
├── AzureDeploy-1.json
├── AzureDeploy-2.json
├── AzureDeploy-3.json
├── AzureDeploy-4.json
└── AzureDeploy.Parameters.json
├── README.md
├── Reverse-Proxy-Sample
├── 5-VM-1-NodeTypes-SecureRP_RollOverStep1.json
├── 5-VM-1-NodeTypes-SecureRP_RollOverStep1.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_RollOverStep2.json
├── 5-VM-1-NodeTypes-SecureRP_RollOverStep2.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationCommonName.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationCommonName.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationNone.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationNone.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationThumbprints.json
├── 5-VM-1-NodeTypes-SecureRP_ServiceCertValidationThumbprints.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_Step1.json
├── 5-VM-1-NodeTypes-SecureRP_Step1.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_Step2.json
├── 5-VM-1-NodeTypes-SecureRP_Step2.parameters.json
├── 5-VM-1-NodeTypes-SecureRP_Step3.json
├── 5-VM-1-NodeTypes-SecureRP_Step3.parameters.json
└── README.md
├── SF-Managed-Basic-SKU-1-NT
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-AppSecret
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-AzureMonitor
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── media
│ ├── azure-monitor-dcr-create-add-source.png
│ ├── azure-monitor-dcr-create-counters.png
│ ├── azure-monitor-dcr-create-custom-events.png
│ ├── azure-monitor-dcr-create-dcr-review.png
│ ├── azure-monitor-dcr-create-review.2.png
│ ├── azure-monitor-dcr-create-select-scope.png
│ ├── azure-monitor-dcr-create.2.png
│ ├── azure-monitor-dcr-create.png
│ ├── azure-monitor-dcr-created.log.png
│ ├── azure-monitor-dcr-created.png
│ └── azure-monitor-dcr-custom-events-destination.png
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-DDoSNwProtection
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-DiskEncryption
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-KVVM-MI
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-KVVM
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-LogAnalytics
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── media
│ ├── log-analytics-sf-counter.png
│ └── log-analytics-sf-event-logs.png
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-MI
├── README.md
├── managedIdentityAndSfrpRoleAssignment.json
├── managedIdentityAndSfrpRoleAssignment.json.parameters.json
├── metadata.json
├── sfmcVmManagedIdentity.json
└── sfmcVmManagedIdentity.parameters.json
├── SF-Managed-Standard-SKU-1-NT-MRP
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-PIPrefix
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT-WAD
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-1-NT
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-ADH
├── HostGroup-And-RoleAssignment.json
├── HostGroup-And-RoleAssignment.parameters.json
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-AppGateway
├── README.md
├── azuredeploy.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-Autoscale
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── metadata.json
└── sfmc-deploy-autoscale.json
├── SF-Managed-Standard-SKU-2-NT-AzureMonitor
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── media
│ ├── azure-monitor-dcr-create-add-source.png
│ ├── azure-monitor-dcr-create-counters.png
│ ├── azure-monitor-dcr-create-custom-events.png
│ ├── azure-monitor-dcr-create-dcr-review.png
│ ├── azure-monitor-dcr-create-review.2.png
│ ├── azure-monitor-dcr-create-select-scope.png
│ ├── azure-monitor-dcr-create.2.png
│ ├── azure-monitor-dcr-create.png
│ ├── azure-monitor-dcr-created.log.png
│ ├── azure-monitor-dcr-created.png
│ └── azure-monitor-dcr-custom-events-destination.png
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-BYOLB
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── createlb-and-assign-role.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-BYOVNET
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── createVNet-assign-role.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-CrossAZ
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-Ephemeral
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-HostEncryption
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-IPv6
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-KVVM-MI
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-KVVM
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-LogAnalytics
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
├── media
│ ├── log-analytics-sf-counter.png
│ └── log-analytics-sf-event-logs.png
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-Spot
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-Stateless
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT-WAD
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── SF-Managed-Standard-SKU-2-NT
├── README.md
├── azuredeploy.json
├── azuredeploy.parameters.json
└── metadata.json
├── Ubuntu-NodeType-Loop-Secure
├── AzureDeploy.Parameters.json
├── AzureDeploy.json
└── README.md
├── Windows-Cluster-Managed-Identity-Auth
├── parameters_WindowsMI.json
└── template_WindowsMI.json
├── media
├── DownloadCert.PNG
└── DownloadTemplate.png
└── scripts
└── New-ServiceFabricClusterCertificate.ps1
/.github/ISSUE_TEMPLATE.md:
--------------------------------------------------------------------------------
1 |
4 | > Please provide us with the following information:
5 | > ---------------------------------------------------------------
6 |
7 | ### This issue is for a: (mark with an `x`)
8 | ```
9 | - [ ] bug report -> please search issues before submitting
10 | - [ ] feature request
11 | - [ ] documentation issue or request
12 | - [ ] regression (a behavior that used to work and stopped in a new release)
13 | ```
14 |
15 | ### Minimal steps to reproduce
16 | >
17 |
18 | ### Any log messages given by the failure
19 | >
20 |
21 | ### Expected/desired behavior
22 | >
23 |
24 | ### OS and Version?
25 | > Windows 7, 8 or 10. Linux (which distribution). macOS (Yosemite? El Capitan? Sierra?)
26 |
27 | ### Versions
28 | >
29 |
30 | ### Mention any other details that might be useful
31 |
32 | > ---------------------------------------------------------------
33 | > Thanks! We'll be in touch soon.
34 |
--------------------------------------------------------------------------------
/.github/PULL_REQUEST_TEMPLATE.md:
--------------------------------------------------------------------------------
1 | ## Purpose
2 |
3 | * ...
4 |
5 | ## Does this introduce a breaking change?
6 |
7 | ```
8 | [ ] Yes
9 | [ ] No
10 | ```
11 |
12 | ## Pull Request Type
13 | What kind of change does this Pull Request introduce?
14 |
15 |
16 | ```
17 | [ ] Bugfix
18 | [ ] Feature
19 | [ ] Code style update (formatting, local variables)
20 | [ ] Refactoring (no functional changes, no api changes)
21 | [ ] Documentation content changes
22 | [ ] Other... Please describe:
23 | ```
24 |
25 | ## How to Test
26 | * Get the code
27 |
28 | ```
29 | git clone [repo-address]
30 | cd [repo-name]
31 | git checkout [branch-name]
32 | npm install
33 | ```
34 |
35 | * Test the code
36 |
37 | ```
38 | ```
39 |
40 | ## What to Check
41 | Verify that the following are valid
42 | * ...
43 |
44 | ## Other Information
45 |
--------------------------------------------------------------------------------
/10-VM-2-NodeTypes-Windows-Stateless-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-UNIQUE"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "nt1InstanceCount" : {
63 | "value": 5
64 | },
65 | "vmNodeType0Size": {
66 | "value": "Standard_D2_V2"
67 | }
68 | }
69 | }
--------------------------------------------------------------------------------
/10-VM-2-NodeTypes-Windows-Stateless-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/10-VM-2-NodeTypes-Windows-Stateless-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/10-VM-2-NodeTypes-Windows-Stateless-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 10 node, 2 node type Windows Service Fabric Cluster ",
3 | "description": "This template allows you to deploy 10 Node, 2 node type Service Fabric Cluster with one node type exclusively supporting stateless workloads on Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys a 10 Node, 2 node type, stateless Windows Service Fabric Cluster",
5 | "githubUsername": "saketharsh",
6 | "dateUpdated": "2022-9-20"
7 | }
8 |
--------------------------------------------------------------------------------
/10-VM-Ubuntu-2-NodeType-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterLocation": {
9 | "value": "GEN-UNIQUE-8"
10 | },
11 | "computeLocation": {
12 | "value": "GEN-UNIQUE-8"
13 | },
14 | "adminUserName": {
15 | "value": "GEN-UNIQUE"
16 | },
17 | "adminPassword": {
18 | "value": "GEN-PASSWORD"
19 | },
20 | "dnsName": {
21 | "value": "GEN-UNIQUE"
22 | },
23 | "certificateThumbprint": {
24 | "value": "GEN-SF-CERT-THUMBPRINT"
25 | },
26 | "sourceVaultValue": {
27 | "value": "GEN-KEYVAULT-RESOURCE-ID"
28 | },
29 | "certificateUrlValue": {
30 | "value": "GEN-SF-CERT-URL"
31 | },
32 | "vmImageSku": {
33 | "value": "16.04-LTS"
34 | },
35 | "vmImageVersion": {
36 | "value": "latest"
37 | },
38 | "vmImagePublisher": {
39 | "value": "Canonical"
40 | },
41 | "nt0ephemeralStartPort": {
42 | "value": 49152
43 | },
44 | "nt0ephemeralEndPort": {
45 | "value": 65534
46 | },
47 | "nt0applicationStartPort": {
48 | "value": 20000
49 | },
50 | "nt0applicationEndPort": {
51 | "value": 30000
52 | },
53 | "nt0fabricTcpGatewayPort": {
54 | "value": 19000
55 | },
56 | "nt0fabricHttpGatewayPort": {
57 | "value": 19080
58 | },
59 | "nt1ephemeralStartPort": {
60 | "value": 49152
61 | },
62 | "nt1ephemeralEndPort": {
63 | "value": 65534
64 | },
65 | "nt1applicationStartPort": {
66 | "value": 20000
67 | },
68 | "nt1applicationEndPort": {
69 | "value": 30000
70 | },
71 | "nt1fabricTcpGatewayPort": {
72 | "value": 19000
73 | },
74 | "nt1fabricHttpGatewayPort": {
75 | "value": 19080
76 | }
77 | }
78 | }
--------------------------------------------------------------------------------
/10-VM-Ubuntu-2-NodeType-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 10 Node, 2 nodetype secure Ubuntu Service Fabric Cluster
2 |
3 | This template allows you to deploy a secure 10 Node, Two node type Service Fabric Cluster running Ubuntu Server on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set.
4 |
5 | This template assumes you have a Common Name certificate uploaded to your keyvault.
6 |
--------------------------------------------------------------------------------
/10-VM-Windows-2-NodeType-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-UNIQUE"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "nt1InstanceCount" : {
63 | "value": 5
64 | },
65 | "vmNodeType0Size": {
66 | "value": "Standard_D2_V2"
67 | }
68 | }
69 | }
--------------------------------------------------------------------------------
/15-VM-2-NodeTypes-Windows-Stateless-CrossAZ-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-UNIQUE"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 15
61 | },
62 | "nt1InstanceCount" : {
63 | "value": 6
64 | },
65 | "vmNodeType0Size": {
66 | "value": "Standard_D2_V2"
67 | }
68 | }
69 | }
70 |
--------------------------------------------------------------------------------
/15-VM-2-NodeTypes-Windows-Stateless-CrossAZ-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-2-NodeTypes-Windows-Stateless-CrossAZ-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/15-VM-2-NodeTypes-Windows-Stateless-CrossAZ-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 15 node, 2 node type Windows Service Fabric Cluster ",
3 | "description": "This template allows you to deploy 10 Node, 2 node type Service Fabric Cluster with one node type exclusively supporting stateless workloads on Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys a 15 Node, 2 node type, stateless Windows Service Fabric Cluster",
5 | "githubUsername": "saketharsh",
6 | "dateUpdated": "2022-9-20""2021-15-03"
7 | }
8 |
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure-UD-Override/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Cross-AZ-Secure-UD-Override/AzureDeploy.Parameters.json
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure-UD-Override/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Cross-AZ-Secure-UD-Override/DownloadTemplate.png
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure-UD-Override/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 15-Node, cross Availability Zone, secure Service Fabric Cluster on Azure",
3 | "description": "This template allows you to deploy a 15-Node, cross AZ Service Fabric Cluster running Windows Server 2019 Datacenter on 3 Standard_D2_V2 size VM ScaleSets, with network security groups enabled.",
4 | "summary": "This template takes a minimum amount of parameters and deploys a 15-Node, cross Availability Zone Service Fabric Cluster",
5 | "githubUsername": "linmeng08",
6 | "dateUpdated": "2022-9-20""2020-09-29"
7 | }
8 |
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Cross-AZ-Secure/AzureDeploy.Parameters.json
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Cross-AZ-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/15-VM-Windows-Cross-AZ-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 15-Node, cross Availability Zone, secure Service Fabric Cluster on Azure",
3 | "description": "This template allows you to deploy a 15-Node, cross AZ Service Fabric Cluster running Windows Server 2019 Datacenter on 3 Standard_D2_V2 size VM ScaleSets, with network security groups enabled.",
4 | "summary": "This template takes a minimum amount of parameters and deploys a 15-Node, cross Availability Zone Service Fabric Cluster",
5 | "githubUsername": "linmeng08",
6 | "dateUpdated": "2022-9-20""2020-09-29"
7 | }
8 |
--------------------------------------------------------------------------------
/15-VM-Windows-Multiple-AZ-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Multiple-AZ-Secure/AzureDeploy.Parameters.json
--------------------------------------------------------------------------------
/15-VM-Windows-Multiple-AZ-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/15-VM-Windows-Multiple-AZ-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/15-VM-Windows-Multiple-AZ-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 15 Node, cross AZ secure Windows Service Fabric Cluster
2 |
3 | This test template allows you to deploy a secure 15 node, cross AZ Service Fabric Cluster running Windows Server 2022 Datacenter on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set.
4 |
5 | The main intent for this template is to show how you can deploy a VMSS with three Azure Zones.
6 |
7 |
8 | ## Use Powershell to deploy your cluster
9 |
10 | Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via arm](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-arm)
11 |
12 |
13 | ## Creating a custom ARM template
14 |
15 | If you are wanting to create a custom ARM template for your cluster, then you have two choices.
16 |
17 | 1. You can acquire this sample template make changes to it.
18 | 2. Log into the azure portal and use the service fabric portal pages to generate the template for you to customize.
19 | * Log on to the Azure Portal [http://aka.ms/servicefabricportal](http://aka.ms/servicefabricportal).
20 |
21 | * Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via portal](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-portal) , but do not click on **create**, instead go to Summary and download the template and parameters.
22 |
23 |
24 | ![DownloadTemplate]
25 |
26 |
27 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
28 |
29 |
30 |
31 | [azure-powershell]:https://azure.microsoft.com/documentation/articles/powershell-install-configure/
32 | [azure-CLI]:https://docs.microsoft.com/en-us/cli/azure/get-started-with-azure-cli?view=azure-cli-latest
33 |
34 |
35 | [DownloadTemplate]: ./DownloadTemplate.png
36 | [NSG3]: ./NSG3.PNG
37 | [NSG2]: ./NSG2.PNG
38 | [DownloadCert]: ./DownloadCert.PNG
39 |
40 |
41 |
42 |
43 |
--------------------------------------------------------------------------------
/15-VM-Windows-Multiple-AZ-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 15 Node, cross Azure Zone, secure Windows Service Fabric Cluster ",
3 | "description": "This template allows you to deploy an secure 15Node, cross AZ Service Fabric Cluster running Windows Server 2022 Datacenter on a Standard_D2_V2 Size VMSS, with network security groups enabled.",
4 | "summary": "This template takes a minimum amount of parameters and deploys a 15 Node, cross Azure Zone Windows Service Fabric Cluster",
5 | "githubUsername": "anantshankar17",
6 | "dateUpdated": "2022-9-20"
7 | }
8 |
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "RedHat"
19 | },
20 | "vmImageOffer": {
21 | "value": "RHEL"
22 | },
23 | "vmImageSku": {
24 | "value": "7.4"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | }
65 | }
66 | }
67 |
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-RHEL-1-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-RHEL-1-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 5 Node secure RHEL Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a secure 5 node, Single node type Service Fabric Cluster running RHEL on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on; template was last tempaltes in August 2018.
11 |
12 | This template assumes that you already have certificates uploaded to your keyvault. If you want to create a new certificate run the **New-ServiceFabricClusterCertificate.ps1** file in this sample.
13 |
14 | You can download the cert from the keyvault from the portal
15 | - Got to the keyvalut resource
16 | - navigate to the secrets tab and download the cert
17 |
18 | ![DownloadCert]
19 |
20 |
21 | ## Creating a custom ARM template
22 |
23 | If you are wanting to create a custom ARM template for your cluster, then you have two choices.
24 |
25 | 1. You can acquire this sample template make changes to it.
26 | 2. Log into the azure portal and use the service fabric portal pages to generate the template for you to customize.
27 | 1. Log on to the Azure Portal [http://aka.ms/servicefabricportal](http://aka.ms/servicefabricportal).
28 |
29 | 2. Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via portal](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-portal) , but do not click on ***create**, instead go to Summary and download the template and parameters.
30 |
31 |
32 | ![DownloadTemplate]
33 |
34 |
35 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
36 |
37 |
38 |
39 | [DownloadTemplate]: ./DownloadTemplate.png
40 | [DownloadCert]: ./DownloadCert.PNG
41 |
42 |
43 |
--------------------------------------------------------------------------------
/5-VM-RHEL-1-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 5 Node Ubuntu Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 5 node Service Fabric Cluster running Ubuntu on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 5 Node Service Fabric Cluster running Ubuntu ",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2017-11-28"
7 | }
8 |
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeType-Secure-OMS/5-VM-Ubuntu-1-NodeType-Secure-OMS.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "linuxcluster"
7 | },
8 | "adminUserName": {
9 | "value": "adminuser"
10 | },
11 | "adminPassword": {
12 | "value": "Pa$$word$1234"
13 | },
14 | "clusterLocation": {
15 | "value": "eastus"
16 | },
17 | "certificateThumbprint": {
18 | "value": ""
19 | },
20 | "sourceVaultValue": {
21 | "value": ""
22 | },
23 | "certificateUrlValue": {
24 | "value": ""
25 | },
26 | "clusterProtectionLevel": {
27 | "value": "EncryptAndSign"
28 | },
29 | "storageAccountType": {
30 | "value": "Standard_LRS"
31 | },
32 | "supportLogStorageAccountType": {
33 | "value": "Standard_LRS"
34 | }
35 | }
36 | }
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "16.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | }
65 | }
66 | }
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Ubuntu-1-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Ubuntu-1-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 5 Node secure ubuntu Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a secure 5 node, Single node type Service Fabric Cluster running Ubuntu Server on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on.
11 |
12 | This template assumes that you already have certificates uploaded to your keyvault. If you want to create a new certificate run the **New-ServiceFabricClusterCertificate.ps1** file in this sample.
13 |
14 | You can download the cert from the keyvault from the portal
15 | - Got to the keyvalut resource
16 | - navigate to the secrets tab and download the cert
17 |
18 | ![DownloadCert]
19 |
20 |
21 | ## Creating a custom ARM template
22 |
23 | If you are wanting to create a custom ARM template for your cluster, then you have two choices.
24 |
25 | 1. You can acquire this sample template make changes to it.
26 | 2. Log into the azure portal and use the service fabric portal pages to generate the template for you to customize.
27 | 1. Log on to the Azure Portal [http://aka.ms/servicefabricportal](http://aka.ms/servicefabricportal).
28 |
29 | 2. Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via portal](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-portal) , but do not click on ***create**, instead go to Summary and download the template and parameters.
30 |
31 |
32 | ![DownloadTemplate]
33 |
34 |
35 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
36 |
37 |
38 |
39 | [DownloadTemplate]: ./DownloadTemplate.png
40 | [DownloadCert]: ./DownloadCert.PNG
41 |
42 |
43 |
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 5 Node Ubuntu Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 5 node Service Fabric Cluster running Ubuntu on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 5 Node Service Fabric Cluster running Ubuntu ",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2017-11-28"
7 | }
8 |
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1804-1-NodeType-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "18.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | }
65 | }
66 | }
67 |
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1804-1-NodeType-Secure/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/5-VM-Ubuntu-1804-1-NodeType-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 5 Node secure Ubuntu 18.04 Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 | This template allows you to deploy a secure 5 Node, one node type Service Fabric Cluster running Ubuntu 18.04 LTS on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on.
12 |
13 | ## Creating a custom ARM template
14 |
15 | If you are wanting to create a custom ARM template for your cluster, then you can acquire this sample template make changes to it.
16 |
17 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
18 |
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-ILB/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "addressPrefix": {
6 | "value": "10.0.0.0/16"
7 | },
8 | "adminPassword": {
9 | "value": "GEN-PASSWORD"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "certificateThumbprint": {
15 | "value": "GEN-CUSTOM-DOMAIN-SSLCERT-THUMBPRINT"
16 | },
17 | "certificateUrlValue": {
18 | "value": "GEN-KEYVAULT-SSL-SECRET-URI"
19 | },
20 | "clusterName": {
21 | "value": "GEN-UNIQUE"
22 | },
23 | "nicName": {
24 | "value": "NIC"
25 | },
26 | "nt0InstanceCount": {
27 | "value": 5
28 | },
29 | "privateIpAddress": {
30 | "value": "10.0.0.250"
31 | },
32 | "privateIPAddressType": {
33 | "value": "Static"
34 | },
35 | "sourceVaultValue": {
36 | "value": "GEN-KEYVAULT-RESOURCE-ID"
37 | },
38 | "subnet0Name": {
39 | "value": "Subnet-0"
40 | },
41 | "subnet0Prefix": {
42 | "value": "10.0.0.0/24"
43 | },
44 | "virtualNetworkName": {
45 | "value": "VNet"
46 | },
47 | "vmImageSku": {
48 | "value": "2022-Datacenter"
49 | },
50 | "vmImageVersion": {
51 | "value": "latest"
52 | },
53 | "vmNodeType0Name": {
54 | "value": "nt0"
55 | },
56 | "vmNodeType0Size": {
57 | "value": "Standard_D2_v2"
58 | }
59 | }
60 | }
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-ILB/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 5 Node Internal Windows Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 5 node Service Fabric Cluster running Windows Server 2022 Datacenter on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 5 Node Service Fabric Cluster running windows ",
5 | "githubUsername": "jagilber",
6 | "dateUpdated": "2023-6-19"
7 | }
8 |
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure-NSG/DownloadCert.PNG
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure-NSG/DownloadTemplate.png
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG1.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG1.PNG
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG2.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG2.PNG
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG3.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure-NSG/NSG3.PNG
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_V2"
64 | }
65 | }
66 | }
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure-NSG/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 5 Node Windows Service Fabric Cluster with NSG enabled",
3 | "description": "This template allows you to deploy a secure 5 node Service Fabric Cluster running Windows Server 2019 Datacenter on a Standard_D2_V2 Size VMSS, with network security groups enabled.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 5 Node Service Fabric Cluster running windows with NSG enabled",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2022-9-20"
7 | }
8 |
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_V2"
64 | }
65 | }
66 | }
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/5-VM-Windows-1-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/5-VM-Windows-1-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 5 Node Windows Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 5 node Service Fabric Cluster running Windows Server 2019 Datacenter on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 5 Node Service Fabric Cluster running windows ",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2022-9-20"
7 | }
8 |
--------------------------------------------------------------------------------
/7-VM-Ubuntu-1804-3-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "18.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | },
65 | "nt1InstanceCount": {
66 | "value": 1
67 | },
68 | "vmNodeType1Size": {
69 | "value": "Standard_D2_v2"
70 | },
71 | "nt2InstanceCount": {
72 | "value": 1
73 | },
74 | "vmNodeType2Size": {
75 | "value": "Standard_D2_v2"
76 | }
77 | }
78 | }
--------------------------------------------------------------------------------
/7-VM-Ubuntu-1804-3-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-1804-3-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/7-VM-Ubuntu-1804-3-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-1804-3-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/7-VM-Ubuntu-1804-3-NodeTypes-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 7 Node, 3 nodetype secure Ubuntu 18.04 Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 | This template allows you to deploy a secure 7 Node,three node type Service Fabric Cluster running Ubuntu 18.04 LTS on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on.
4 |
5 | ## Creating a custom ARM template
6 |
7 | If you are wanting to create a custom ARM template for your cluster, then you can acquire this sample template make changes to it.
8 |
9 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
--------------------------------------------------------------------------------
/7-VM-Ubuntu-1804-3-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 7 Node, 3 nodetype Ubuntu 18.04 Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu 18.04 on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu 18.04 ",
5 | "githubUsername": "nickomang",
6 | "dateUpdated": "2020-02-24"
7 | }
8 |
--------------------------------------------------------------------------------
/7-VM-Ubuntu-2004-3-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "20.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | },
65 | "nt1InstanceCount": {
66 | "value": 1
67 | },
68 | "vmNodeType1Size": {
69 | "value": "Standard_D2_v2"
70 | },
71 | "nt2InstanceCount": {
72 | "value": 1
73 | },
74 | "vmNodeType2Size": {
75 | "value": "Standard_D2_v2"
76 | }
77 | }
78 | }
--------------------------------------------------------------------------------
/7-VM-Ubuntu-2004-3-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-2004-3-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/7-VM-Ubuntu-2004-3-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-2004-3-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/7-VM-Ubuntu-2004-3-NodeTypes-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 7 Node, 3 nodetype secure Ubuntu 20.04 Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 | This template allows you to deploy a secure 7 Node,three node type Service Fabric Cluster running Ubuntu 20.04 LTS on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on.
4 |
5 | ## Creating a custom ARM template
6 |
7 | If you are wanting to create a custom ARM template for your cluster, then you can acquire this sample template make changes to it.
8 |
9 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
--------------------------------------------------------------------------------
/7-VM-Ubuntu-2004-3-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 7 Node, 3 nodetype Ubuntu 20.04 Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu 20.04 on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu 20.04 ",
5 | "githubUsername": "nickomang",
6 | "dateUpdated": "2022-02-15"
7 | }
8 |
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "16.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_v2"
64 | },
65 | "nt1InstanceCount": {
66 | "value": 1
67 | },
68 | "vmNodeType1Size": {
69 | "value": "Standard_D2_v2"
70 | },
71 | "nt2InstanceCount": {
72 | "value": 1
73 | },
74 | "vmNodeType2Size": {
75 | "value": "Standard_D2_v2"
76 | }
77 | }
78 | }
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-3-NodeTypes-Secure/DownloadCert.PNG
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Ubuntu-3-NodeTypes-Secure/DownloadTemplate.png
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/README.md:
--------------------------------------------------------------------------------
1 | # 7 Node, 3 nodetype secure ubuntu Service Fabric Cluster with Azure Diagnostics enabled
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a secure 7 Node,three node type Service Fabric Cluster running Ubuntu Server on a Standard_D2_v2 SKU size on Azure Virtual Machine Scale Set with Azure Diagnostics turned on.
11 |
12 | This template assumes that you already have certificates uploaded to your keyvault. If you want to create a new certificate run the **New-ServiceFabricClusterCertificate.ps1** file in this sample. That script will output the values necessary for deployment via the parameters file.
13 |
14 | You can download the .PFX from the keyvault from the portal
15 | - Got to the keyvalut resource
16 | - navigate to the secrets tab and download the .pfx
17 |
18 | ![DownloadCert]
19 |
20 | ## Creating a custom ARM template
21 |
22 | If you are wanting to create a custom ARM template for your cluster, then you have two choices.
23 |
24 | 1. You can acquire this sample template make changes to it.
25 | 2. Log into the azure portal and use the service fabric portal pages to generate the template for you to customize.
26 | 1. Log on to the Azure Portal [http://aka.ms/servicefabricportal](http://aka.ms/servicefabricportal).
27 |
28 | 2. Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via portal](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-portal) , but do not click on ***create**, instead go to Summary and download the template and parameters.
29 |
30 |
31 | ![DownloadTemplate][DownloadTemplate]
32 |
33 |
34 | Unzip the downloaded .zip on your local machine, make any changes to template or the parameter file as you need.
35 |
36 |
37 |
38 | [DownloadTemplate]: ./DownloadTemplate.png
39 | [DownloadCert]: ./DownloadCert.PNG
40 |
41 |
42 |
43 |
--------------------------------------------------------------------------------
/7-VM-Ubuntu-3-NodeTypes-Secure/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 7 Node, 3 nodetype Ubuntu Service Fabric Cluster",
3 | "description": "This template allows you to deploy a secure 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu on a Standard_D2_V2 Size VMSS.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 7 Node, 3 nodetype Service Fabric Cluster running Ubuntu ",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2017-11-28"
7 | }
8 |
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-UNIQUE"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | },
62 | "vmNodeType0Size": {
63 | "value": "Standard_D2_V2"
64 | },
65 | "nt1InstanceCount": {
66 | "value": 1
67 | },
68 | "vmNodeType1Size": {
69 | "value": "Standard_D2_V2"
70 | },
71 | "nt2InstanceCount": {
72 | "value": 1
73 | },
74 | "vmNodeType2Size": {
75 | "value": "Standard_D2_V2"
76 | }
77 | }
78 | }
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Windows-3-NodeTypes-Secure-NSG/DownloadCert.PNG
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Windows-3-NodeTypes-Secure-NSG/DownloadTemplate.png
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG1.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG1.PNG
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG2.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG2.PNG
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG3.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/7-VM-Windows-3-NodeTypes-Secure-NSG/NSG3.PNG
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------
/7-VM-Windows-3-NodeTypes-Secure-NSG/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "itemDisplayName": "Deploy a 7 Node, 3 Node type Windows Service Fabric Cluster with NSG enabled",
3 | "description": "This template allows you to deploy a secure 7 Node, 3 Node type Service Fabric Cluster running Windows Server 2019 Datacenter on a Standard_D2_V2 Size VMSS, with network security groups enabled.",
4 | "summary": "This template takes a minimum amount of parameters and deploys 7 Node, 3 Node type Service Fabric Cluster running windows with NSG enabled",
5 | "githubUsername": "chackdan",
6 | "dateUpdated": "2022-9-20""2017-11-28"
7 | }
8 |
--------------------------------------------------------------------------------
/CHANGELOG.md:
--------------------------------------------------------------------------------
1 | ## [project-title] Changelog
2 |
3 |
4 | # x.y.z (yyyy-mm-dd)
5 |
6 | *Features*
7 | * ...
8 |
9 | *Bug Fixes*
10 | * ...
11 |
12 | *Breaking Changes*
13 | * ...
14 |
--------------------------------------------------------------------------------
/Cert-Rollover-Sample/5-VM-1-NodeTypes-Secure.parameters_Step1.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "Cluster"
7 | },
8 | "clusterLocation": {
9 | "value": "westus"
10 | },
11 | "adminUserName": {
12 | "value": "testuser"
13 | },
14 | "vmImagePublisher": {
15 | "value": "MicrosoftWindowsServer"
16 | },
17 | "vmImageOffer": {
18 | "value": "WindowsServer"
19 | },
20 | "vmImageSku": {
21 | "value": "2012-R2-Datacenter"
22 | },
23 | "vmImageVersion": {
24 | "value": "latest"
25 | },
26 | "loadBalancedAppPort1": {
27 | "value": 80
28 | },
29 | "loadBalancedAppPort2": {
30 | "value": 8081
31 | },
32 | "certificateStoreValue": {
33 | "value": "My"
34 | },
35 | "certificateThumbprint": {
36 | "value": "thumbprint value"
37 | },
38 | "sourceVaultValue": {
39 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
40 | },
41 | "certificateUrlValue": {
42 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
43 | },
44 | "clusterProtectionLevel": {
45 | "value": "EncryptAndSign"
46 | },
47 | "storageAccountType": {
48 | "value": "Standard_LRS"
49 | },
50 | "supportLogStorageAccountType": {
51 | "value": "Standard_LRS"
52 | }
53 | }
54 | }
55 |
--------------------------------------------------------------------------------
/Cert-Rollover-Sample/5-VM-1-NodeTypes-Secure.parameters_Step2.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "Cluster"
7 | },
8 | "clusterLocation": {
9 | "value": "westus"
10 | },
11 | "adminUserName": {
12 | "value": "testuser"
13 | },
14 | "vmImagePublisher": {
15 | "value": "MicrosoftWindowsServer"
16 | },
17 | "vmImageOffer": {
18 | "value": "WindowsServer"
19 | },
20 | "vmImageSku": {
21 | "value": "2012-R2-Datacenter"
22 | },
23 | "vmImageVersion": {
24 | "value": "latest"
25 | },
26 | "loadBalancedAppPort1": {
27 | "value": 80
28 | },
29 | "loadBalancedAppPort2": {
30 | "value": 8081
31 | },
32 | "certificateStoreValue": {
33 | "value": "My"
34 | },
35 | "secCertificateThumbprint": {
36 | "value": "thumbprint value"
37 | },
38 | "secCertificateUrlValue": {
39 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
40 | },
41 | "certificateThumbprint": {
42 | "value": "thumbprint value"
43 | },
44 | "sourceVaultValue": {
45 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
46 | },
47 | "certificateUrlValue": {
48 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
49 | },
50 | "clusterProtectionLevel": {
51 | "value": "EncryptAndSign"
52 | },
53 | "storageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "supportLogStorageAccountType": {
57 | "value": "Standard_LRS"
58 | }
59 | }
60 | }
--------------------------------------------------------------------------------
/Cert-Rollover-Sample/README.md:
--------------------------------------------------------------------------------
1 | # Introduction
2 |
3 | This folder contains the set of ARM templates you can use to deploy a secure five node service fabric cluster, add a new certificate and then rollover the current primary certificate. You can use these to follow along with the documentation for [rolling over certificates in your secure cluster](https://azure.microsoft.com/en-us/documentation/articles/service-fabric-cluster-security-update-certs-azure/)
4 |
5 |
6 | ## Microsoft Azure Service Fabric ARM template Samples in this folder
7 |
8 | ### Step1: Provision a secure cluster
9 | 1. Template to provision a five node secure cluster - 5-VM-1-NodeTypes-Secure_Step1.JSON
10 | 2. Template parameters for the above template - 5-VM-1-NodeTypes-Secure.parameters_Step1.JSON
11 |
12 |
13 | ### Step2 :Add a secondary certificate and swamp it to be the primary using ARM Powershell
14 |
15 | [How to roll over certificates in your secure cluster](https://azure.microsoft.com/en-us/documentation/articles/service-fabric-cluster-security-update-certs-azure/)
16 |
17 | 1. Template to provision a five node secure cluster - 5-VM-1-NodeTypes-Secure_Step2.JSON
18 | 2. Template parameters for the above template - 5-VM-1-NodeTypes-Secure.parameters_Step2.JSON
--------------------------------------------------------------------------------
/LICENSE.md:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) Microsoft Corporation. All rights reserved.
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE
--------------------------------------------------------------------------------
/Primary-NodeType-Scaling-Sample/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2022-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | }
59 | }
60 | }
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | ---
2 | languages:
3 | - powershell
4 | - json
5 | products:
6 | - azure
7 | - azure-service-fabric
8 | page_type: sample
9 | description: "Sample Service Fabric cluster templates that you can customize for use in setting up your clusters."
10 | ---
11 |
12 | # Service Fabric Sample Cluster templates
13 |
14 | ## Details
15 |
16 | This repository contains sample Service Fabric cluster templates that you can customize for use in setting up your clusters.
17 |
18 | * The intent is to provide a wide variety of templates, based on the customer input and the types of clusters we have seen our customers create.
19 | * The templates cover both Windows and Linux clusters
20 |
21 | ## Other
22 |
23 | Although, we try to keep a wide variety of templates to suite broad customer needs, there will be ones that are not in here as samples, If there are templates, you feel we should add as samples, then either contribute that to the repo. or raise a git-hub issue to get one added.
24 |
25 | ## Backlog
26 |
27 | 1) Linux cluster templates with Network Security Group on.
28 | 2) cross AZ Cluster template
29 | 3) Cross regional cluster template
30 |
--------------------------------------------------------------------------------
/Reverse-Proxy-Sample/5-VM-1-NodeTypes-SecureRP_ServiceCertValidationNone.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "Cluster"
10 | },
11 | "adminUserName": {
12 | "value": "admuser"
13 | },
14 | "adminPassword": {
15 | "value": "val$$$"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2012-R2-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterCertificateStorevalue": {
36 | "value": "My"
37 | },
38 | "clusterCertificateThumbprint": {
39 | "value": "thumbprint value"
40 | },
41 | "sourceVaultvalue": {
42 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
43 | },
44 | "clusterCertificateUrlvalue": {
45 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
46 | },
47 | "sfReverseProxyCertificateStorevalue": {
48 | "value": "My"
49 | },
50 | "sfReverseProxyCertificateThumbprint": {
51 | "value": "thumbprint value"
52 | },
53 | "sfReverseProxyCertificateUrlvalue": {
54 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
55 | },
56 | "clusterProtectionLevel": {
57 | "value": "EncryptAndSign"
58 | },
59 | "storageAccountType": {
60 | "value": "Standard_LRS"
61 | },
62 | "supportLogStorageAccountType": {
63 | "value": "Standard_LRS"
64 | },
65 | "applicationDiagnosticsStorageAccountType": {
66 | "value": "Standard_LRS"
67 | },
68 | "nt0InstanceCount": {
69 | "value": 5
70 | }
71 | }
72 | }
73 |
--------------------------------------------------------------------------------
/Reverse-Proxy-Sample/5-VM-1-NodeTypes-SecureRP_Step1.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "Cluster"
10 | },
11 | "adminUserName": {
12 | "value": "admuser"
13 | },
14 | "adminPassword": {
15 | "value": "val$$$"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2012-R2-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterCertificateStorevalue": {
36 | "value": "My"
37 | },
38 | "clusterCertificateThumbprint": {
39 | "value": "thumbprint value"
40 | },
41 | "sourceVaultvalue": {
42 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
43 | },
44 | "clusterCertificateUrlvalue": {
45 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
46 | },
47 | "clusterProtectionLevel": {
48 | "value": "EncryptAndSign"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "nt0InstanceCount": {
60 | "value": 5
61 | }
62 | }
63 | }
64 |
--------------------------------------------------------------------------------
/Reverse-Proxy-Sample/5-VM-1-NodeTypes-SecureRP_Step2.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "Cluster"
10 | },
11 | "adminUserName": {
12 | "value": "admuser"
13 | },
14 | "adminPassword": {
15 | "value": "val$$$"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2012-R2-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterCertificateStorevalue": {
36 | "value": "My"
37 | },
38 | "clusterCertificateThumbprint": {
39 | "value": "thumbprint value"
40 | },
41 | "sourceVaultvalue": {
42 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
43 | },
44 | "clusterCertificateUrlvalue": {
45 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
46 | },
47 | "sfReverseProxyCertificateStorevalue": {
48 | "value": "My"
49 | },
50 | "sfReverseProxyCertificateThumbprint": {
51 | "value": "thumbprint value"
52 | },
53 | "sfReverseProxyCertificateUrlvalue": {
54 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
55 | },
56 | "clusterProtectionLevel": {
57 | "value": "EncryptAndSign"
58 | },
59 | "storageAccountType": {
60 | "value": "Standard_LRS"
61 | },
62 | "supportLogStorageAccountType": {
63 | "value": "Standard_LRS"
64 | },
65 | "applicationDiagnosticsStorageAccountType": {
66 | "value": "Standard_LRS"
67 | },
68 | "nt0InstanceCount": {
69 | "value": 5
70 | }
71 | }
72 | }
73 |
--------------------------------------------------------------------------------
/Reverse-Proxy-Sample/5-VM-1-NodeTypes-SecureRP_Step3.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "Cluster"
10 | },
11 | "adminUserName": {
12 | "value": "admuser"
13 | },
14 | "adminPassword": {
15 | "value": "val$$$"
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2012-R2-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterCertificateStorevalue": {
36 | "value": "My"
37 | },
38 | "clusterCertificateThumbprint": {
39 | "value": "thumbprint value"
40 | },
41 | "sourceVaultvalue": {
42 | "value": "/subscriptions/subscription value/resourceGroups/key vault resource group name/providers/Microsoft.KeyVault/vaults/key vault name"
43 | },
44 | "clusterCertificateUrlvalue": {
45 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
46 | },
47 | "sfReverseProxyCertificateStorevalue": {
48 | "value": "My"
49 | },
50 | "sfReverseProxyCertificateThumbprint": {
51 | "value": "thumbprint value"
52 | },
53 | "sfReverseProxyCertificateUrlvalue": {
54 | "value": "Refers to the location URL in your key vault where the certificate was uploaded, it is should be in the format of https://.vault.azure.net:443/secrets/"
55 | },
56 | "clusterProtectionLevel": {
57 | "value": "EncryptAndSign"
58 | },
59 | "storageAccountType": {
60 | "value": "Standard_LRS"
61 | },
62 | "supportLogStorageAccountType": {
63 | "value": "Standard_LRS"
64 | },
65 | "applicationDiagnosticsStorageAccountType": {
66 | "value": "Standard_LRS"
67 | },
68 | "nt0InstanceCount": {
69 | "value": 5
70 | }
71 | }
72 | }
73 |
--------------------------------------------------------------------------------
/SF-Managed-Basic-SKU-1-NT/README.md:
--------------------------------------------------------------------------------
1 | # Basic SKU Service Fabric managed cluster
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Basic* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Basic-SKU-1-NT/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Basic"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmImagePublisher": {
24 | "value": "MicrosoftWindowsServer"
25 | },
26 | "vmImageOffer": {
27 | "value": "WindowsServer"
28 | },
29 | "vmImageSku": {
30 | "value": "2022-Datacenter"
31 | },
32 | "vmImageVersion": {
33 | "value": "latest"
34 | },
35 | "vmSize": {
36 | "value": "Standard_D2s_v3"
37 | },
38 | "vmInstanceCount": {
39 | "value": 5
40 | },
41 | "dataDiskSizeGB": {
42 | "value": 128
43 | },
44 | "managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | }
47 | }
48 | }
49 |
--------------------------------------------------------------------------------
/SF-Managed-Basic-SKU-1-NT/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Basic SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Basic SKU Service Fabric managed cluster",
6 | "summary": "This template takes a minimum set of parameters and deploys a Basic SKU Service Fabric managed cluster",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AppSecret/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 1 node type with an application secret from Key Vault
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set with an application secret from Key Vault.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AppSecret/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmImagePublisher": {
24 | "value": "MicrosoftWindowsServer"
25 | },
26 | "vmImageOffer": {
27 | "value": "WindowsServer"
28 | },
29 | "vmImageSku": {
30 | "value": "2022-Datacenter"
31 | },
32 | "vmImageVersion": {
33 | "value": "latest"
34 | },
35 | "vmSize": {
36 | "value": "Standard_D2s_v3"
37 | },
38 | "vmInstanceCount": {
39 | "value": 5
40 | },
41 | "dataDiskSizeGB": {
42 | "value": 256
43 | },
44 | "managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | }
47 | }
48 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AppSecret/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with an application secret from Key Vault",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and an application secret from Key Vault.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and an application secret from Key Vault.",
7 | "dateUpdated": "2021-05-06"
8 | }
9 |
10 |
11 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clusterName": {
12 | "value": ""
13 | },
14 | "dataDiskSizeGB": {
15 | "value": 256
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": ""
19 | },
20 | "vmInstanceCount": {
21 | "value": 6
22 | },
23 | "vmSize": {
24 | "value": "Standard_D2s_v3"
25 | }
26 | }
27 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-add-source.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-add-source.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-counters.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-counters.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-custom-events.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-custom-events.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-dcr-review.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-dcr-review.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-review.2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-review.2.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-select-scope.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create-select-scope.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create.2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create.2.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-create.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-created.log.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-created.log.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-created.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-created.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-custom-events-destination.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-AzureMonitor/media/azure-monitor-dcr-custom-events-destination.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-AzureMonitor/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Azure Monitor",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with Azure Monitor enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with Azure Monitor enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DDoSNwProtection/README.md:
--------------------------------------------------------------------------------
1 |
2 | # Standard SKU Service Fabric managed cluster, 1 node type with Azure DDoS Network Protection Plan
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set with Azure DDoS Network Protection Plan.
12 |
13 | ## Use Powershell to deploy your cluster
14 |
15 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
16 |
17 | ## Resources
18 |
19 | For more info, see:
20 |
21 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
22 |
23 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
24 |
25 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
26 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DDoSNwProtection/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "nodeTypeName": {
18 | "value": "NT1"
19 | },
20 | "vmImagePublisher": {
21 | "value": "MicrosoftWindowsServer"
22 | },
23 | "vmImageOffer": {
24 | "value": "WindowsServer"
25 | },
26 | "vmImageSku": {
27 | "value": "2022-Datacenter"
28 | },
29 | "vmImageVersion": {
30 | "value": "latest"
31 | },
32 | "vmSize": {
33 | "value": "Standard_D2s_v3"
34 | },
35 | "vmInstanceCount": {
36 | "value": 5
37 | },
38 | "dataDiskSizeGB": {
39 | "value": 100
40 | },
41 | "certificateSource": {
42 | "value": "KeyVault"
43 | }
44 | }
45 | }
46 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DDoSNwProtection/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Use Azure DDoS Protection in a Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and Azure DDoS Network Protection Plan",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and Azure DDoS Network Protection Plan",
7 | "githubUsername": "ankurjain007",
8 | "dateUpdated": "2023-09-05"
9 | }
10 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DiskEncryption/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 1 node type with disk encryption enabled
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set with disk encryption enabled.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Enable disk encryption for Service Fabric managed cluster nodes](https://docs.microsoft.com/azure/service-fabric/how-to-enable-managed-cluster-disk-encryption) for a walkthrough of the template changes required to enable disk encryption.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for details on managed clusters.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DiskEncryption/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmImagePublisher": {
24 | "value": "MicrosoftWindowsServer"
25 | },
26 | "vmImageOffer": {
27 | "value": "WindowsServer"
28 | },
29 | "vmImageSku": {
30 | "value": "2022-Datacenter"
31 | },
32 | "vmImageVersion": {
33 | "value": "latest"
34 | },
35 | "vmSize": {
36 | "value": "Standard_D2s_v3"
37 | },
38 | "vmInstanceCount": {
39 | "value": 5
40 | },
41 | "dataDiskSizeGB": {
42 | "value": 256
43 | },
44 | "managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | },
47 | "keyVaultResourceId": {
48 | "value": "GEN-KEY-VAULT-FULL-RESOURCE-ID"
49 | },
50 | "volumeType": {
51 | "value": "All"
52 | }
53 | }
54 | }
55 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-DiskEncryption/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with disk encryption",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with disk encryption enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with disk encryption enabled.",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-KVVM-MI/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Key Vault virtual machine extension (KVVM)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with KVVM and managed identity enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with KVVM and managed identity enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-KVVM/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "certificateUrls": {
12 | "value": [
13 | ""
14 | ],
15 | "metadata": {
16 | "description": "https://.vault.azure.net/secrets/"
17 | }
18 | },
19 | "clientCertificateThumbprint": {
20 | "value": ""
21 | },
22 | "clusterName": {
23 | "value": ""
24 | },
25 | "clusterSku": {
26 | "value": "Standard"
27 | },
28 | "dataDiskSizeGB": {
29 | "value": 128
30 | },
31 | "managedDataDiskType": {
32 | "value": "StandardSSD_LRS"
33 | },
34 | "nodeTypeName": {
35 | "value": "NT1"
36 | },
37 | "vmImageSku": {
38 | "value": "2022-Datacenter"
39 | },
40 | "vmInstanceCount": {
41 | "value": 6
42 | },
43 | "vmSize": {
44 | "value": "Standard_D2s_v3"
45 | }
46 | }
47 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-KVVM/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Key Vault virtual machine extension (KVVM)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with KVVM.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with KVVM.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-LogAnalytics/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clientCertificateThumbprint": {
12 | "value": ""
13 | },
14 | "clusterName": {
15 | "value": ""
16 | },
17 | "dataDiskSizeGB": {
18 | "value": 256
19 | },
20 | "laWorkspaceId": {
21 | "value": ""
22 | },
23 | "laWorkspaceKey": {
24 | "value": ""
25 | },
26 | "vmInstanceCount": {
27 | "value": 6
28 | },
29 | "vmSize": {
30 | "value": "Standard_D2s_v3"
31 | }
32 | }
33 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-LogAnalytics/media/log-analytics-sf-counter.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-LogAnalytics/media/log-analytics-sf-counter.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-LogAnalytics/media/log-analytics-sf-event-logs.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-1-NT-LogAnalytics/media/log-analytics-sf-event-logs.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-LogAnalytics/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Log Analytics",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with Log Analytics enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with Log Analytics enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MI/managedIdentityAndSfrpRoleAssignment.json.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "userAssignedIdentityName": {
6 | "value": "SFMC-MI"
7 | },
8 | "vmIdentityRoleNameGuid": {
9 | "value": "GENERATE-GUID"
10 | },
11 | "serviceFabricRpPrincipalId": {
12 | "value": "SFRP-APP-PRINCIPALID"
13 | }
14 | }
15 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MI/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with a managed identity",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and a managed identity.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and a managed identity.",
7 | "githubUsername": "nickomang",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MI/sfmcVmManagedIdentity.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "CLUSTER-NAME"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "ADMIN-USER"
13 | },
14 | "adminPassword": {
15 | "value": "SECURE-STRING"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "CLIENT-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "vmInstanceCount": {
27 | "value": 5
28 | },
29 | "dataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "vmImagePublisher": {
33 | "value": "MicrosoftWindowsServer"
34 | },
35 | "vmImageOffer": {
36 | "value": "WindowsServer"
37 | },
38 | "vmImageSku": {
39 | "value": "2022-Datacenter"
40 | },
41 | "vmImageVersion": {
42 | "value": "latest"
43 | },
44 | "userAssignedIdentityResourceId": {
45 | "value": "IDENTITY-FULL-RESOURCE-ID"
46 | }
47 | }
48 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MRP/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 1 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2019 Datacenter* on a *Standard_D2s_v3* size virtual machine scale set.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MRP/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmImagePublisher": {
24 | "value": "MicrosoftWindowsServer"
25 | },
26 | "vmImageOffer": {
27 | "value": "WindowsServer"
28 | },
29 | "vmImageSku": {
30 | "value": "2019-Datacenter"
31 | },
32 | "vmImageVersion": {
33 | "value": "latest"
34 | },
35 | "vmSize": {
36 | "value": "Standard_D2s_v3"
37 | },
38 | "vmInstanceCount": {
39 | "value": 5
40 | },
41 | "dataDiskSizeGB": {
42 | "value": 256
43 | },
44 | "managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | }
47 | }
48 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-MRP/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type.",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-PIPrefix/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 1 node type with Public IP Prefix
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set with Public IP Prefix.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-PIPrefix/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE",
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "nodeTypeName": {
18 | "value": "NT1"
19 | },
20 | "vmImagePublisher": {
21 | "value": "MicrosoftWindowsServer"
22 | },
23 | "vmImageOffer": {
24 | "value": "WindowsServer"
25 | },
26 | "vmImageSku": {
27 | "value": "2022-Datacenter"
28 | },
29 | "vmImageVersion": {
30 | "value": "latest"
31 | },
32 | "vmSize": {
33 | "value": "Standard_D2s_v3"
34 | },
35 | "vmInstanceCount": {
36 | "value": 5
37 | },
38 | "dataDiskSizeGB": {
39 | "value": 100
40 | },
41 | "certificateSource": {
42 | "value": "KeyVault"
43 | }
44 | }
45 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-PIPrefix/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Public IP Prefix",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and a Public IP Prefix",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type and a Public IP Prefix",
7 | "githubUsername": "ankurjain007",
8 | "dateUpdated": "2023-07-05"
9 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-WAD/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clientCertificateThumbprint": {
12 | "value": ""
13 | },
14 | "clusterName": {
15 | "value": ""
16 | },
17 | "dataDiskSizeGB": {
18 | "value": 256
19 | },
20 | "roleAssignmentId": {
21 | "value": ""
22 | },
23 | "subscriptionSFRPId": {
24 | "value": ""
25 | },
26 | "userAssignedIdentity": {
27 | "value": ""
28 | },
29 | "vmInstanceCount": {
30 | "value": 6
31 | },
32 | "vmSize": {
33 | "value": "Standard_D2s_v3"
34 | }
35 | }
36 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT-WAD/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Windows Azure Diagnostics (WAD)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with WAD enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type with WAD enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 1 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains a single node type running *Windows Server 2022 Datacenter* on a *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Set.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeTypeName": {
21 | "value": "NT1"
22 | },
23 | "vmImagePublisher": {
24 | "value": "MicrosoftWindowsServer"
25 | },
26 | "vmImageOffer": {
27 | "value": "WindowsServer"
28 | },
29 | "vmImageSku": {
30 | "value": "2022-Datacenter"
31 | },
32 | "vmImageVersion": {
33 | "value": "latest"
34 | },
35 | "vmSize": {
36 | "value": "Standard_D2s_v3"
37 | },
38 | "vmInstanceCount": {
39 | "value": 5
40 | },
41 | "dataDiskSizeGB": {
42 | "value": 256
43 | },
44 | "managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | }
47 | }
48 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-1-NT/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 1 node type.",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-ADH/HostGroup-And-RoleAssignment.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "zoneId": {
6 | "value": 1
7 | },
8 | "numberOfHosts": {
9 | "value": 5
10 | },
11 | "hostGroupName": {
12 | "value": ""
13 | },
14 | "dedicatedHostNamePrefix": {
15 | "value": ""
16 | },
17 | "dedicatedHostSKU": {
18 | "value": "DSv3-Type1"
19 | },
20 | "SFRPAadServicePrincipalId": {
21 | "value": ""
22 | },
23 | "hostGroupRoleAssignmentId": {
24 | "value": ""
25 | }
26 | }
27 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-ADH/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster with Azure Dedicated Hosts
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | These templates allow you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets with Azure Dedicated Hosts.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-ADH/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "CLUSTER-NAME"
7 | },
8 | "adminUserName": {
9 | "value": "vmadmin"
10 | },
11 | "adminPassword": {
12 | "value": "SecureString"
13 | },
14 | "vmImagePublisher": {
15 | "value": "MicrosoftWindowsServer"
16 | },
17 | "vmImageOffer": {
18 | "value": "WindowsServer"
19 | },
20 | "vmImageSku": {
21 | "value": "2022-Datacenter"
22 | },
23 | "vmImageVersion": {
24 | "value": "latest"
25 | },
26 | "nodeTypeName": {
27 | "value": "pnt"
28 | },
29 | "nodeTypeName2": {
30 | "value": "snt"
31 | },
32 | "vmSize": {
33 | "value": "Standard_D2s_v3"
34 | },
35 | "vmInstanceCount": {
36 | "value": 6
37 | },
38 | "dataDiskSizeGB": {
39 | "value": 120
40 | },
41 | "clientThumbprint": {
42 | "value": "CERT-THUMBPRINT"
43 | },
44 | "hostGroupId": {
45 | "value": "HOST-GROUP-FULL-RESOURCE-ID"
46 | },
47 | "zone": {
48 | "value": "1"
49 | }
50 | }
51 | }
52 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-ADH/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster on Azure Dedicated Hosts",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster on Azure Dedicated Hosts with 2 node type",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster on Azure Dedicated Hosts with 2 node type",
7 | "githubUsername": "ankurjain007",
8 | "dateUpdated": "2022-06-06"
9 | }
10 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AppGateway/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node types with Azure Application Gateway
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the Standard SKU. This cluster contains two node types running Windows Server 2022 Datacenter on a Standard_D2s_v3 SKU size on Azure Virtual Machine Scale Set with Azure Application Gateway.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AppGateway/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Azure Application Gateway",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types and an Azure Application Gateway",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types and an Azure Application Gateway",
7 | "githubUsername": "ankurjain007",
8 | "dateUpdated": "2023-07-05"
9 | }
10 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Autoscale/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets.
11 |
12 | This repo also contains an example autoscale configuration for scale up and scale down rules and enables them. For more details on how to use this, please see [Configure autoscaling on a managed cluster](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-autoscale)
13 |
14 | ## Use Powershell to deploy your cluster
15 |
16 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
17 |
18 | ## Resources
19 |
20 | For more info, see:
21 |
22 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
23 |
24 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
25 |
26 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
27 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Autoscale/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Autoscale/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type.",
7 | "dateUpdated": "2021-10-25"
8 | }
9 |
10 |
11 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clientCertificateThumbprint": {
12 | "value": ""
13 | },
14 | "clusterName": {
15 | "value": ""
16 | },
17 | "nodeType1DataDiskSizeGB": {
18 | "value": 256
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmInstanceCount": {
24 | "value": 6
25 | },
26 | "nodeType1VmSize": {
27 | "value": "Standard_D2s_v3"
28 | },
29 | "nodeType1managedDataDiskType": {
30 | "value": "StandardSSD_LRS"
31 | },
32 | "nodeType2DataDiskSizeGB": {
33 | "value": 128
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmInstanceCount": {
39 | "value": 6
40 | },
41 | "nodeType2VmSize": {
42 | "value": "Standard_D2s_v3"
43 | },
44 | "nodeType2managedDataDiskType": {
45 | "value": "StandardSSD_LRS"
46 | }
47 | }
48 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-add-source.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-add-source.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-counters.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-counters.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-custom-events.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-custom-events.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-dcr-review.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-dcr-review.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-review.2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-review.2.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-select-scope.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create-select-scope.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create.2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create.2.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-create.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-created.log.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-created.log.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-created.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-created.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-custom-events-destination.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-AzureMonitor/media/azure-monitor-dcr-custom-events-destination.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-AzureMonitor/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Azure Monitor",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with Azure Monitor enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with Azure Monitor enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOLB/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type, and existing load balancer for secondary node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster, leveraging an existing Azure Load Balancer for secondary node type 2, using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets.
11 |
12 | You *must* have an existing Azure Load Balancer with Backend and NAT pools configured for this to work. See [Bring your own Azure Load Balancer documentation](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-networking#bring-your-own-azure-load-balancer) for more details.
13 |
14 | ## Use Powershell to deploy your cluster
15 |
16 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
17 |
18 | ## Resources
19 |
20 | For more info, see:
21 |
22 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
23 |
24 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
25 |
26 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-07-01-preview/managedclusters) for more details on modifying this ARM template to meet your requirements.
27 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOLB/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOLB/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with existing load balancer",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. Node type 2 is configured to use existing load balancer.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. Node type 2 is configured to use existing load balancer.",
7 | "githubUsername": "craftyhouse",
8 | "dateUpdated": "2021-08-11"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOVNET/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type, deployed in to existing subnet
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster in to an existing subnet using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets.
11 |
12 | You *must* have an existing subnet for this to work. See [Bring your own virtual network documentation](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-networking#bring-your-own-virtual-network) for more details.
13 |
14 | ## Use Powershell to deploy your cluster
15 |
16 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
17 |
18 | ## Resources
19 |
20 | For more info, see:
21 |
22 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
23 |
24 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
25 |
26 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-07-01-preview/managedclusters) for more details on modifying this ARM template to meet your requirements.
27 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOVNET/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-BYOVNET/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster in to an existing subnet",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type in to an existing subnet.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type in to an existing subnet.",
7 | "githubUsername": "craftyhouse",
8 | "dateUpdated": "2021-08-11"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-CrossAZ/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets deployed across three zones.
11 |
12 | ## Note on cross AZ support
13 | 1. Service fabric will setup a single VMSS across three zones.
14 |
15 | ## Use Powershell to deploy your cluster
16 |
17 | Go through the process of creating the cluster as described in [Creating Service Fabric Cluster via ARM template](https://docs.microsoft.com/azure/service-fabric/service-fabric-cluster-creation-via-arm)
18 |
19 | ## Resources
20 |
21 | For more info, see:
22 |
23 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
24 |
25 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
26 |
27 | - [Service Fabric managed clusters spanning availability zones](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-availability-zones) for more details on availability zone spanning.
28 |
29 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
30 |
31 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-CrossAZ/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 9
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 6
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-CrossAZ/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster across Availability Zones",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster across 3 Availability Zones with 2 node type.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster across 3 Availability Zones with 2 node type.",
7 | "dateUpdated": "2021-05-06"
8 | }
9 |
10 |
11 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Ephemeral/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster with a node type having Ephemeral OS Disks
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets. One of the node types is configured to have Ephemeral OS Disks.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Ephemeral/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D16s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Ephemeral/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with a secondary node type having Ephemeral OS disks.",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type contains Ephemeral OS disks VMs.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type contains Ephemeral OS Disks.",
7 | "githubUsername": "saketharsh",
8 | "dateUpdated": "2022-06-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-HostEncryption/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets and enables host based encryption. See the [enable disk encryption](https://review.docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-enable-disk-encryption) documentation before deploying.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-HostEncryption/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-HostEncryption/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with host based disk encryption.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with host based disk encryption.",
7 | "dateUpdated": "2021-11-09"
8 | }
9 |
10 |
11 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-IPv6/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster with IPv6 enabled using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets.
11 |
12 | See [How to Enable IPv6 for Service Fabric managed clusters](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-networking#ipv6) for more details.
13 |
14 | ## Use Powershell to deploy your cluster
15 |
16 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
17 |
18 | ## Resources
19 |
20 | For more info, see:
21 |
22 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
23 |
24 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
25 |
26 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
27 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-IPv6/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-IPv6/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with IPv6 enabled",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type and enables IPv6.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type and enables IPv6.",
7 | "githubUsername": "craftyhouse",
8 | "dateUpdated": "2021-08-11"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-KVVM-MI/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Key Vault virtual machine extension (KVVM)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types with KVVM and managed identity enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types with KVVM and managed identity enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-KVVM/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "certificateUrls": {
12 | "value": [
13 | ""
14 | ],
15 | "metadata": {
16 | "description": "https://.vault.azure.net/secrets/"
17 | }
18 | },
19 | "clientCertificateThumbprint": {
20 | "value": ""
21 | },
22 | "clusterName": {
23 | "value": ""
24 | },
25 | "clusterSku": {
26 | "value": "Standard"
27 | },
28 | "nodeType1DataDiskSizeGB": {
29 | "value": 256
30 | },
31 | "nodeType1Name": {
32 | "value": "NT1"
33 | },
34 | "nodeType1VmInstanceCount": {
35 | "value": 6
36 | },
37 | "nodeType1VmSize": {
38 | "value": "Standard_D2s_v3"
39 | },
40 | "nodeType1managedDataDiskType": {
41 | "value": "StandardSSD_LRS"
42 | },
43 | "nodeType2DataDiskSizeGB": {
44 | "value": 128
45 | },
46 | "nodeType2Name": {
47 | "value": "NT2"
48 | },
49 | "nodeType2VmInstanceCount": {
50 | "value": 6
51 | },
52 | "nodeType2VmSize": {
53 | "value": "Standard_D2s_v3"
54 | },
55 | "nodeType2managedDataDiskType": {
56 | "value": "StandardSSD_LRS"
57 | }
58 | }
59 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-KVVM/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Key Vault virtual machine extension (KVVM)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types with KVVM.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node types with KVVM.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-LogAnalytics/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clientCertificateThumbprint": {
12 | "value": ""
13 | },
14 | "clusterName": {
15 | "value": ""
16 | },
17 | "laWorkspaceId": {
18 | "value": ""
19 | },
20 | "laWorkspaceKey": {
21 | "value": ""
22 | },
23 | "nodeType1DataDiskSizeGB": {
24 | "value": 256
25 | },
26 | "nodeType1Name": {
27 | "value": "NT1"
28 | },
29 | "nodeType1VmInstanceCount": {
30 | "value": 6
31 | },
32 | "nodeType1VmSize": {
33 | "value": "Standard_D2s_v3"
34 | },
35 | "nodeType1managedDataDiskType": {
36 | "value": "StandardSSD_LRS"
37 | },
38 | "nodeType2DataDiskSizeGB": {
39 | "value": 128
40 | },
41 | "nodeType2Name": {
42 | "value": "NT2"
43 | },
44 | "nodeType2VmInstanceCount": {
45 | "value": 6
46 | },
47 | "nodeType2VmSize": {
48 | "value": "Standard_D2s_v3"
49 | },
50 | "nodeType2managedDataDiskType": {
51 | "value": "StandardSSD_LRS"
52 | }
53 | }
54 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-LogAnalytics/media/log-analytics-sf-counter.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-LogAnalytics/media/log-analytics-sf-counter.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-LogAnalytics/media/log-analytics-sf-event-logs.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/SF-Managed-Standard-SKU-2-NT-LogAnalytics/media/log-analytics-sf-event-logs.png
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-LogAnalytics/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Log Analytics",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with Log Analytics enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with Log Analytics enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Spot/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster with a node type containing Spot VMs
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets. One of the node types is configured to have Spot VMs.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Spot/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D16s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Spot/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with a secondary node type having Spot VMs.",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type contains Spot VMs.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type contains Spot VMs.",
7 | "githubUsername": "saketharsh",
8 | "dateUpdated": "2022-06-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Stateless/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster with a stateless node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets. One of the node types is configured to run only stateless services which enables faster node scaling.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster stateless node types](https://docs.microsoft.com/azure/service-fabric/how-to-managed-cluster-stateless-node-type) for more details on stateless node types.
25 |
26 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
27 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Stateless/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-Stateless/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with a stateless node type",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type is stateless.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type. One node type is stateless.",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-WAD/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "adminPassword": {
6 | "value": ""
7 | },
8 | "adminUserName": {
9 | "value": ""
10 | },
11 | "clientCertificateThumbprint": {
12 | "value": ""
13 | },
14 | "clusterName": {
15 | "value": ""
16 | },
17 | "nodeType1DataDiskSizeGB": {
18 | "value": 256
19 | },
20 | "nodeType1managedDataDiskType": {
21 | "value": "StandardSSD_LRS"
22 | },
23 | "nodeType1Name": {
24 | "value": "NT1"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 6
28 | },
29 | "nodeType1VmSize": {
30 | "value": "Standard_D2s_v3"
31 | },
32 | "nodeType2DataDiskSizeGB": {
33 | "value": 128
34 | },
35 | "nodeType2managedDataDiskType": {
36 | "value": "StandardSSD_LRS"
37 | },
38 | "nodeType2Name": {
39 | "value": "NT2"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 6
43 | },
44 | "nodeType2VmSize": {
45 | "value": "Standard_D2s_v3"
46 | },
47 | "roleAssignmentId": {
48 | "value": ""
49 | },
50 | "subscriptionSFRPId": {
51 | "value": ""
52 | },
53 | "userAssignedIdentity": {
54 | "value": "sfmcevts"
55 | }
56 | }
57 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT-WAD/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster with Windows Azure Diagnostics (WAD)",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with WAD enabled.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type with WAD enabled.",
7 | "githubUsername": "jagilber",
8 | "dateUpdated": "2022-03-01"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT/README.md:
--------------------------------------------------------------------------------
1 | # Standard SKU Service Fabric managed cluster, 2 node type
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 | This template allows you to deploy a Service Fabric managed cluster using the *Standard* SKU. This cluster contains two node types running *Windows Server 2022 Datacenter* on *Standard_D2s_v3* SKU size on Azure Virtual Machine Scale Sets.
11 |
12 | ## Use Powershell to deploy your cluster
13 |
14 | Go through the process of creating the cluster as described in [Deploy a Service Fabric managed cluster](https://docs.microsoft.com/azure/service-fabric/tutorial-managed-cluster-deploy)
15 |
16 | ## Resources
17 |
18 | For more info, see:
19 |
20 | - [Service Fabric managed cluster quickstart](https://docs.microsoft.com/azure/service-fabric/quickstart-managed-cluster-template) for a walkthrough of the ARM template.
21 |
22 | - [Service Fabric managed cluster overview](https://docs.microsoft.com/azure/service-fabric/overview-managed-cluster) for more details on cluster SKUs.
23 |
24 | - [Service Fabric managed cluster template format](https://docs.microsoft.com/azure/templates/microsoft.servicefabric/2021-05-01/managedclusters) for more details on modifying this ARM template to meet your requirements.
25 |
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT/azuredeploy.parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterName": {
6 | "value": "GEN-UNIQUE"
7 | },
8 | "clusterSku": {
9 | "value": "Standard"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "clientCertificateThumbprint": {
18 | "value": "GEN-SF-CERT-THUMBPRINT"
19 | },
20 | "nodeType1Name": {
21 | "value": "NT1"
22 | },
23 | "nodeType1VmSize": {
24 | "value": "Standard_D2s_v3"
25 | },
26 | "nodeType1VmInstanceCount": {
27 | "value": 5
28 | },
29 | "nodeType1DataDiskSizeGB": {
30 | "value": 256
31 | },
32 | "nodeType1managedDataDiskType": {
33 | "value": "StandardSSD_LRS"
34 | },
35 | "nodeType2Name": {
36 | "value": "NT2"
37 | },
38 | "nodeType2VmSize": {
39 | "value": "Standard_D2s_v3"
40 | },
41 | "nodeType2VmInstanceCount": {
42 | "value": 3
43 | },
44 | "nodeType2DataDiskSizeGB": {
45 | "value": 128
46 | },
47 | "nodeType2managedDataDiskType": {
48 | "value": "StandardSSD_LRS"
49 | },
50 | "vmImagePublisher": {
51 | "value": "MicrosoftWindowsServer"
52 | },
53 | "vmImageOffer": {
54 | "value": "WindowsServer"
55 | },
56 | "vmImageSku": {
57 | "value": "2022-Datacenter"
58 | },
59 | "vmImageVersion": {
60 | "value": "latest"
61 | }
62 | }
63 | }
--------------------------------------------------------------------------------
/SF-Managed-Standard-SKU-2-NT/metadata.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://aka.ms/azure-quickstart-templates-metadata-schema#",
3 | "type": "QuickStart",
4 | "itemDisplayName": "Deploy a Standard SKU Service Fabric managed cluster",
5 | "description": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type.",
6 | "summary": "This template takes a minimum set of parameters and deploys a Standard SKU Service Fabric managed cluster with 2 node type.",
7 | "githubUsername": "peterpogorski",
8 | "dateUpdated": "2021-05-06"
9 | }
10 |
11 |
12 |
--------------------------------------------------------------------------------
/Ubuntu-NodeType-Loop-Secure/AzureDeploy.Parameters.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "westus"
7 | },
8 | "clusterName": {
9 | "value": "GEN-UNIQUE"
10 | },
11 | "adminUserName": {
12 | "value": "GEN-UNIQUE"
13 | },
14 | "adminPassword": {
15 | "value": "GEN-PASSWORD"
16 | },
17 | "vmImagePublisher": {
18 | "value": "Canonical"
19 | },
20 | "vmImageOffer": {
21 | "value": "UbuntuServer"
22 | },
23 | "vmImageSku": {
24 | "value": "16.04-LTS"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 8081
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-CUSTOM-DOMAIN-SSLCERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-KEYVAULT-SSL-SECRET-URI"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "vnetName": {
57 | "value": "Existing VNET"
58 | },
59 | "vnetResourceGroup": {
60 | "value": "Existing VNET Resource Group"
61 | },
62 | "subnetNames": {
63 | "value": ["sf-subnet","sf-subnet","sf-subnet"]
64 | },
65 | "nt0InstanceCount": {
66 | "value": 5
67 | },
68 | "vmNodeTypeSize": {
69 | "value": ["Standard_D2_v2","Standard_D2_v2"]
70 | }
71 | }
72 | }
73 |
--------------------------------------------------------------------------------
/Ubuntu-NodeType-Loop-Secure/README.md:
--------------------------------------------------------------------------------
1 | # Multiple node types Secure Ubuntu Service Fabric Cluster
2 |
3 | This template allows you to create multiple node types with each node type having different number of VMSS Instances
4 |
5 | ## Overview
6 |
7 | This ARM template will provision Service Fabric cluster which has internet accessible and authenticated endpoints.
8 | The endpoint can be exposed through a public load balancer or Application Gateway.
9 |
10 |
11 | ## Prerequisites
12 |
13 | * Azure Key Vault in the same region where the Service Fabric Cluster would be created.
14 | * Client Authentication Certificate - either self signed or issued from a Trusted Root CA.
15 | * Azure Virtual Network with sufficient address space to provision VMs
16 | * Azure CLI installed on Windows, Mac OS or Linux machine.
17 | * Service Fabric CLI SFCTL installed on Windows, Mac OS or Linux machine.
18 | * Access to Azure Subscription
19 |
20 |
21 | ### Notes
22 | This ARM template uses resource loops to create multiple node types, public ip addresses and load balancers and adds the node types to the Service Fabric Cluster. Each node type is associated with a Load Balancer using the loop index.
23 | Each nodetype can be deployed into it's own subnet.
24 |
25 | ### Key Parameters
26 |
27 | clientCertificateStoreValue - Thumb print of PFX certificate uploaded to Key Vault.
28 |
29 | certificateThumbprint - Thumb print from filename.crt, stored in local machine's certificate store.
30 |
31 | loopCount - Number of Nodetypes to create with index 0 being the primary node type
32 |
33 | vmNodeTypeSize - Specify VM size for each node type
34 |
35 | subnetNames - Array of subnet names for each node type. This array length should match the node type loop count
36 |
37 |
38 |
39 | ### Key Variables
40 |
41 | ntProperties - Specify array of node type placement properties for each node type.
42 |
--------------------------------------------------------------------------------
/Windows-Cluster-Managed-Identity-Auth/parameters_WindowsMI.json:
--------------------------------------------------------------------------------
1 | {
2 | "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentParameters.json#",
3 | "contentVersion": "1.0.0.0",
4 | "parameters": {
5 | "clusterLocation": {
6 | "value": "centraluseuap"
7 | },
8 | "clusterName": {
9 | "value": "PLACEHOLDER_NAME"
10 | },
11 | "adminUserName": {
12 | "value": "vmadmin"
13 | },
14 | "adminPassword": {
15 | "value": ""
16 | },
17 | "vmImagePublisher": {
18 | "value": "MicrosoftWindowsServer"
19 | },
20 | "vmImageOffer": {
21 | "value": "WindowsServer"
22 | },
23 | "vmImageSku": {
24 | "value": "2019-Datacenter"
25 | },
26 | "vmImageVersion": {
27 | "value": "latest"
28 | },
29 | "loadBalancedAppPort1": {
30 | "value": 80
31 | },
32 | "loadBalancedAppPort2": {
33 | "value": 443
34 | },
35 | "clusterProtectionLevel": {
36 | "value": "EncryptAndSign"
37 | },
38 | "certificateStoreValue": {
39 | "value": "My"
40 | },
41 | "certificateThumbprint": {
42 | "value": "GEN-SF-CERT-THUMBPRINT"
43 | },
44 | "sourceVaultValue": {
45 | "value": "GEN-KEYVAULT-RESOURCE-ID"
46 | },
47 | "certificateUrlValue": {
48 | "value": "GEN-SF-CERT-URL"
49 | },
50 | "storageAccountType": {
51 | "value": "Standard_LRS"
52 | },
53 | "supportLogStorageAccountType": {
54 | "value": "Standard_LRS"
55 | },
56 | "applicationDiagnosticsStorageAccountType": {
57 | "value": "Standard_LRS"
58 | },
59 | "durability": {
60 | "value": "Silver"
61 | },
62 | "reliability": {
63 | "value": "Silver"
64 | },
65 | "nt0InstanceCount": {
66 | "value": 5
67 | },
68 | "vmNodeType0Size": {
69 | "value": "Standard_D2_V2"
70 | }
71 | }
72 | }
--------------------------------------------------------------------------------
/media/DownloadCert.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/media/DownloadCert.PNG
--------------------------------------------------------------------------------
/media/DownloadTemplate.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Azure-Samples/service-fabric-cluster-templates/6abe808d4d41fe05bedbfa59fd51f7d213069bfc/media/DownloadTemplate.png
--------------------------------------------------------------------------------
/scripts/New-ServiceFabricClusterCertificate.ps1:
--------------------------------------------------------------------------------
1 | #Requires -Module Az.KeyVault
2 |
3 | # Use this script to create a certificate that you can use to secure a Service Fabric Cluster
4 | # This script requires an existing KeyVault that is EnabledForDeployment and EnabledForTemplateDeployment. The vault must be in the same region as the cluster.
5 | # To create a new vault, set the EnabledForDeployment, and set EnabledForTemplateDeployment property run:
6 | #
7 | #$keyvaultRG="mykevaultrg"
8 | #$KeyVaultName="mykevaultname"
9 | #New-AzResourceGroup -Name $KeyvaultRG -Location WestUS
10 | #New-AzKeyVault -VaultName $KeyVaultName -ResourceGroupName $KeyvaultRG -Location WestUS -EnabledForDeployment -EnabledForTemplateDeployment -EnabledForTemplateDeployment
11 | #
12 | # Once the certificate is created and stored in the vault, the script will provide the parameter values needed for template deployment
13 | #
14 | # You can download the cert from the key-vault portal, if you need it on your machine.
15 |
16 | param(
17 | [string] [Parameter(Mandatory=$true)] $Password,
18 | [string] [Parameter(Mandatory=$true)] $CertDNSName,
19 | [string] [Parameter(Mandatory=$true)] $KeyVaultName,
20 | [string] [Parameter(Mandatory=$true)] $KeyVaultSecretName
21 | )
22 |
23 | $SecurePassword = ConvertTo-SecureString -String $Password -AsPlainText -Force
24 | $CertFileFullPath = $(Join-Path (Split-Path -Parent $MyInvocation.MyCommand.Definition) "\$CertDNSName.pfx")
25 |
26 | $NewCert = New-SelfSignedCertificate -CertStoreLocation Cert:\CurrentUser\My -DnsName $CertDNSName
27 | Export-PfxCertificate -FilePath $CertFileFullPath -Password $SecurePassword -Cert $NewCert
28 |
29 | $Bytes = [System.IO.File]::ReadAllBytes($CertFileFullPath)
30 | $Base64 = [System.Convert]::ToBase64String($Bytes)
31 |
32 | $JSONBlob = @{
33 | data = $Base64
34 | dataType = 'pfx'
35 | password = $Password
36 | } | ConvertTo-Json
37 |
38 | $ContentBytes = [System.Text.Encoding]::UTF8.GetBytes($JSONBlob)
39 | $Content = [System.Convert]::ToBase64String($ContentBytes)
40 |
41 | $SecretValue = ConvertTo-SecureString -String $Content -AsPlainText -Force
42 | $NewSecret = Set-AzKeyVaultSecret -VaultName $KeyVaultName -Name $KeyVaultSecretName -SecretValue $SecretValue -Verbose
43 |
44 | Write-Host
45 | Write-Host "Source Vault Resource Id: "$(Get-AzKeyVault -VaultName $KeyVaultName).ResourceId
46 | Write-Host "Certificate URL : "$NewSecret.Id
47 | Write-Host "Certificate Thumbprint : "$NewCert.Thumbprint
--------------------------------------------------------------------------------