service-fabric-reverse-proxy | reverse proxy for accessing services | Proxy library
kandi X-RAY | service-fabric-reverse-proxy Summary
kandi X-RAY | service-fabric-reverse-proxy Summary
A reverse proxy for accessing services in a Service Fabric cluster. The reverse proxy is intended to behave like the reverse proxy available as a service in a hosted Service Fabric cluster. The use is meant for development environments on on-premise Service Fabric clusters, e.g., like the sample dev cluster running on Vagrant boxes, see blog post or github repo. The reverse proxy allows access to Service Fabric services that exposes HTTP endpoints. This provides a single point of entry for all services and a generic way to communicate between services. The proxy may be running on all nodes for high availability. For accessing the services in the cluster from the outside the proxy can be put behind another reverse proxy and load balancer such as nginx or HAProxy. The ServicePartitionResolver resolves the requested service partition closest to the proxy according to the documentation. The HTTP listener endpoints for a partition appears to be returned in a round-robin fashion.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of service-fabric-reverse-proxy
service-fabric-reverse-proxy Key Features
service-fabric-reverse-proxy Examples and Code Snippets
Community Discussions
Trending Discussions on service-fabric-reverse-proxy
QUESTION
I have my cluster setup with a reverse proxy set at port 8080. I now want to change the certificate used on the reverse proxy.
I added the new certificate to my KeyVault, and referenced it in vaultCertificates
in the Microsoft.Compute/virtualMachineScaleSets
ARM template. Pushed it, waited until it completed, RDP'd into each node and verified that the new certificate was installed.
I updated one of my front facing applications to use the new certificate and it worked fine (thus verifying that it could find it by the thumbprint).
I then modified reverseProxyCertificate.thumbprint
in the Microsoft.ServiceFabric/clusters
ARM template to reflect the new thumbprint. Pushed this and waited. And waited. And waited. After about an hour my cluster status went from "Updating" to "Ready" (although in my activity log the Write Clusters
operation still says Started
)
Now, when I go to https://{mycluster}.ukwest.cloudapp.azure.com:8080/ it is still serving up the old certificate.
I RDP'd into one of my nodes and opened up D:\SvcFab\FabricHostSettings.xml
and under ApplicationGateway/Http
, GatewayX509CertificateFindValue
has the correct (new) value.
Looking here, I know it's for a local cluster, but it should be similar to one hosted on Azure, the last step is "Start and complete cluster upgrade". I can't find how, or if you're meant to, do this in Azure. I know for a fact that you can't just restart the VMSS, or it messes everything up!
Have I missed something?
...ANSWER
Answered 2017-Feb-28 at 10:33See:
Cluster must be initially created with RP cert that is different from cluster cert.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install service-fabric-reverse-proxy
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page