How-To setup Azure cluster with custom DNS and CA signed x509 SSL certificate
When spinning up a new service fabric cluster in Azure, certain node types might host web frontends that are public facing.
Please add a very detailed how-to guide on how to configure these nodes to have CA signed SSL certificates using custom domain names.
The different documentation I have found for service fabric only describes self-signed certificates, which are of no use when dealing with public SSL web sites. And I cannot find any service fabric related documentation for setting up custom DNS names.

3 comments
-
JR commented
Here is a good Stack Over flow article on installing a X.509 CERT with a Service Fabric Cluster. Note: I didn't have to use any powershelgl scripts to get it up and going until I had to associated a second CERT with my cluster. The biggest problem is that in the past most the work was done with Powershell scripts but now all of it can be done through the portal.azure.com portal.
https://stackoverflow.com/questions/42919313/add-https-to-service-fabric-web-api
Also, you need to use AAD so you can Manage your Cluster. Here is a great article and I have added comments at the bottom. Please read this article on how to set up AAD for Service Fabric Explorer.
https://docs.microsoft.com/en-us/azure/service-fabric/service-fabric-cluster-creation-setup-aad. Also, as of October 17, 2018. I added feedback at the bottom of the page on how to set up AAD(just for SFE) when initial creating the cluster. NOTE: you can't not go back and add AAD after the cluster has been created.The Documentation at time is very poor.
-
Jake commented
Any update to this?
-
Volodymyr commented
That is definitely one of the most important articles not being covered comprehensively in existing documentation.