Demystifying The Resultant Objects From Service Fabric Cluster Creation

In this article, I will be going through all objects that result from the Create Service Fabric Cluster template, the default template used by Visual Studio Publish Wizard and Azure Portal.

From Visual Studio,
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
From Azure Templates,
 

Resources created

Demystifying The Resultant Objects From Service Fabric Cluster Creation 
 
Article Base
 
Even though you may use any existent project created with this template, in the following article, I am explaining how to create and publish a Service Fabric application,
Related Articles,
  • Demystifying the resultant objects from Service Fabric Cluster Creation Part (Network Security Group, Azure Load Balancer, Azure Key Vault)
  • Demystifying the resultant objects from Service Fabric Cluster Creation Part II - Work in Progress (The two storage accounts and the Service Fabric Cluster) 
  • Demystifying the resultant objects from Service Fabric Cluster Creation Part III - Work in Progress (Azure Virtual Network, Virtual Machine Scale Set, Public IP Address)

What is Azure Key Vault?

 
Azure Key Vault is a security vault where you may store your keys and passwords. It offers:
  • Global redundancy;
  • Cloud-scale;
  • FIPS 140-2 Level 2 validated HSM;
  • Fast and easy to import/create your keys. 
Read more about Azure Key Vault:

What is the usage of Azure Key Vault with Service Fabric?

 
Demystifying The Resultant Objects From Service Fabric Cluster Creation 
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation 
 
Azure Key Vault has the certificate required to deploy your Service into the Service Fabric Cluster and also to access your Service Fabric Cluster.
 

What is Azure Load Balancer?

 
Azure Load Balancer is used mainly to scale, secure, and improve your application availability. It offers -
  • Load Balancing, balancing the income/outcome traffic;
  • Port Forwarding, filtering/redirecting traffic to different ports;
  • Application diagnostic and transparent, not interfering the traffic flow and packages;
  • Automatic reconfiguration, recognizing automatically how many machines are available to balance the income traffic;
  • Health probes, removing unhealthy instances based on rules defined by you;
  • Outbound connections, providing outbound connectivity through different mechanisms. Read more here.
Read more about Azure Load Balancer:

What is the usage of Azure Load Balancer with Service Fabric?

 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Load balancing provides the load balancing between the front-end public IP and the back-end virtual machine instances.
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation 
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation

Health Probes, creating 4 different health probes each with a different load balancing rule.
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation

Port Forwarding, creating 3 different inbound NAT rules.

Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
Demystifying The Resultant Objects From Service Fabric Cluster Creation

What is a Network Security Group?

 
A Network Security Group acts as a traffic filter, filtering traffic from the internet to your endpoint, from your endpoint to internet, and also filter the communication among your internal services. It offers:
  • Inbound security rules;
  • Outbound security rules;
  • Network Interfaces;
  • Subnets. 
Read more about Network Security Group - Official Website.
 

What is the usage of Network Security Group with Service Fabric?

 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
Demystifying The Resultant Objects From Service Fabric Cluster Creation
 
The network security group comes with 13 inbound security rules and 3 outbound security rules. They control the traffic from the internet into your service, the traffic from your service to the internet and the traffic between the services inside Azure.

What is next?

  • Demystifying the resultant objects from Service Fabric Cluster Creation Part II(The two storage accounts and the Service Fabric Cluster)
  • Demystifying the resultant objects from Service Fabric Cluster Creation Part III(Azure Virtual Network, Virtual Machine Scale Set, Public IP Address)
External References