Tutorial: Deploy an application to Service Fabric Mesh using a template

Important

The preview of Azure Service Fabric Mesh has been retired. New deployments will no longer be permitted through the Service Fabric Mesh API. Support for existing deployments will continue through April 28, 2021.

For details, see Azure Service Fabric Mesh Preview Retirement.

This tutorial is part one of a series. You'll learn how to deploy an Azure Service Fabric Mesh application using a template. The application is composed of an ASP.NET web front-end service and an ASP.NET Core Web API back-end service, which are found in Docker Hub. You pull the two container images from Docker Hub and then push them to your own private registry. You then create an Azure RM template for the application and deploy the application from your container registry to Service Fabric Mesh. When you're finished, you'll have a simple To Do List application running in Service Fabric Mesh.

In part one of the series, you learn how to:

  • Create a private Azure Container Registry instance
  • Push a container image to the registry
  • Create RM template and parameters files
  • Deploy an application to Service Fabric Mesh

In this tutorial series you learn how to:

Service Fabric Mesh is currently in preview. Previews are made available to you on the condition that you agree to the supplemental terms of use. Some aspects of this feature may change prior to general availability (GA).

Prerequisites

Before you begin this tutorial:

Create a container registry

The container images associated with the services in your Service Fabric Mesh application must be stored in a container registry. This tutorial uses a private Azure Container Registry (ACR)instance.

Use the following steps to create an ACR instance. If you already have an ACR instance setup, you can skip ahead.

Sign in to Azure

Sign in to Azure and set the active subscription.

az login
az account set --subscription "<subscriptionName>"

Create a resource group

An Azure resource group is a logical container into which Azure resources are deployed and managed. Use the following command to create a resource group named myResourceGroup in the eastus location.

az group create --name myResourceGroup --location eastus

Create the container registry

Create an ACR instance using the az acr create command. The registry name must be unique within Azure and contain 5-50 alphanumeric characters. In the following example, the name myContainerRegistry is used. If you get an error that the registry name is in use, choose a different name.

az acr create --resource-group myResourceGroup --name myContainerRegistry --sku Basic

When the registry is created, you'll see output similar to the following:

{
  "adminUserEnabled": false,
  "creationDate": "2018-09-13T19:43:57.388203+00:00",
  "id": "/subscriptions/<subscription>/resourceGroups/myResourceGroup/providers/Microsoft.ContainerRegistry/registries/myContainerRegistry",
  "location": "eastus",
  "loginServer": "mycontainerregistry.azurecr.io",
  "name": "myContainerRegistry",
  "provisioningState": "Succeeded",
  "resourceGroup": "myResourceGroup",
  "sku": {
    "name": "Basic",
    "tier": "Basic"
  },
  "status": null,
  "storageAccount": null,
  "tags": {},
  "type": "Microsoft.ContainerRegistry/registries"
}

Push the images to Azure Container Registry

This tutorial uses the To Do List sample application as an example. The container images for the WebFrontEnd and the ToDoService services can be found on Docker Hub. See Build a Service Fabric Mesh web app for information on how to build the application in Visual Studio. Service Fabric Mesh can run Windows or Linux Docker containers. If you're working with Linux containers, select Switch to Linux containers in Docker. If you're working with Windows containers, select Switch to Windows containers in Docker.

To push an image to an ACR instance, you must first have a container image. If you don't yet have any local container images, use the docker pull command to pull the WebFrontEnd and ToDoService images from Docker Hub.

Note

Effective November 2, 2020, download rate limits apply to anonymous and authenticated requests to Docker Hub from Docker Free plan accounts and are enforced by IP address.

These commands makes use of public images from Docker Hub. Please note that you may be rate limited. For more details, see Authenticate with Docker Hub.

Pull the Windows images:

docker pull seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709
docker pull seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709

Before you can push an image to your registry, you must tag it with the fully qualified name of your ACR login server.

Run the following command to get the full login server name of your ACR instance.

az acr list --resource-group myResourceGroup --query "[].{acrLoginServer:loginServer}" --output table

AcrLoginServer
---------------------------------
mycontainerregistry.azurecr.io

Now tag your Docker image using the docker tag command. The following example tags the seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709 and seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709 images. If you are using different images, substitute those image names in the following command.

docker tag seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709 mycontainerregistry.azurecr.io/seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709
docker tag seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709 mycontainerregistry.azurecr.io/seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709

Sign in to the Azure Container Registry.

az acr login -n myContainerRegistry

Push the image to the ACR instance with the docker push command:

docker push mycontainerregistry.azurecr.io/seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709
docker push mycontainerregistry.azurecr.io/seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709

List container images

To see the repositories in your ACR instance, run the following:

az acr repository list --name myContainerRegistry --output table

Result
-------------------------------
seabreeze/azure-mesh-todo-webfrontend
seabreeze/azure-mesh-todo-service

The following example lists the tags on the azure-mesh-todo-service repository.

az acr repository show-tags --name myContainerRegistry --repository seabreeze/azure-mesh-todo-service --output table

Result
--------
1.0-nanoserver-1709

The preceding output confirms the presence of azure-mesh-todo-service:1.0-nanoserver-1709 in the private container registry. Also verify the presence of azure-mesh-todo-webfrontend:1.0-nanoserver-1709.

Retrieve credentials for the registry

Important

Enabling the admin user on an ACR instance is not recommended for production scenarios. It is done here for convenience. For production scenarios, use a service principal for both user and system authentication in production scenarios.

In order to deploy a container instance from the registry that was created using a template, you must provide the registry credentials during the deployment. First, enable the admin user on your registry with the following command:

az acr update --name myContainerRegistry --admin-enabled true

Next, get the registry login server name, user name, and password using the following commands:

az acr list --resource-group myResourceGroup --query "[].{acrLoginServer:loginServer}" --output table
az acr credential show --name myContainerRegistry --query username
az acr credential show --name myContainerRegistry --query "passwords[0].value"

Use the returned ACR login server name, user name, and password values when creating the RM template and parameters files in the following section.

Download and explore the template and parameters files

A Service Fabric Mesh application is an Azure resource that you can deploy and manage using Azure Resource Manager (RM) templates. If you aren't familiar with the concepts of deploying and managing your Azure solutions, see Azure Resource Manager overview and Understand the structure and syntax of RM Templates.

This tutorial uses the To Do List sample as an example. Instead of building new template and parameters files, download the mesh_rp.windows.json deployment template and mesh_rp.windows.parameter.json parameters files.

Parameters

When you have values in your template that you anticipate changing once the application is deployed, or would like to have the option to change on a per deployment basis (if you plan on reusing this template for other deployments), the best practice is to parameterize the values. The right way to do this is to create a "parameters" section at the top of your deployment template, where you specify parameter names and properties, which are then referenced later in the deployment template. Each parameter definition includes type, defaultValue, and an optional metadata section with a description.

The parameters section is defined at the top of your deployment template, right before the resources section:

{
    "$schema": "https://schema.management.azure.com/schemas/2014-04-01-preview/deploymentTemplate.json",
    "contentVersion": "1.0.0.0",
    "parameters": {
      ...
    },
    "resources": [

In the mesh_rp.windows.json deployment template, the following parameters are declared: location, registryPassword, registryUserName, registryServer, frontEndImage, serviceImage, frontEndCpu, serviceCpu, frontEndMemory, serviceMemory, frontEndReplicaCount, serviceReplicaCount. Descriptions for each parameter can be found in the deployment template file.

These parameters are used in the mesh_rp.windows.parameter.json parameters file. Using a separate parameters file gives you the ability to change parameter values from deployment to deployment without updating the deployment template itself.

Overview of the application and services

Services are specified in the template as properties of the application resource. Applications are deployed to a private network, which is declared as a resource in the template. Services can use volumes to persist data, which are declared as resources in the template. For each service, the OS type, code package(s), number of replicas, and the network are specified as properties of the service. For each code package, specify the container image, endpoints, memory and CPU resources, and image repository credentials. At a high level, the template for a Service Fabric Mesh application with multiple services looks like:

{
  "$schema": "https://schema.management.azure.com/schemas/2014-04-01-preview/deploymentTemplate.json",
  "contentVersion": "1.0.0.0",
  "parameters": {
    ...
  },
  "resources": [
    {
      "apiVersion": "2018-09-01-preview",
      "name": "MyMeshApplication",
      "type": "Microsoft.ServiceFabricMesh/applications",
      "location": "[parameters('location')]",
      "dependsOn": [
        "Microsoft.ServiceFabricMesh/networks/MeshAppNetwork",
        "Microsoft.ServiceFabricMesh/volumes/ServiceAVolume"
      ],
      "properties": {
        "services": [
          {
            "name": "ServiceA",
            "properties": {
              "description": "ServiceA description.",
              "osType": "Linux",
              "codePackages": [
                {
                  "name": "ServiceA",
                  "image": "[parameters('frontEndImage')]",
                  "volumeRefs": [
                    {
                      "name": "[resourceId('Microsoft.ServiceFabricMesh/volumes', 'ServiceAVolume')]",
                      "destinationPath": "/app/data"
                    }
                  ],
                  "endpoints": [
                    {
                      "name": "ServiceAListener",
                      "port": 80
                    }
                  ],
                  "resources": {
                    "requests": {
                      "cpu": "[parameters('frontEndCpu')]",
                      "memoryInGB": "[parameters('frontEndMemory')]"
                    }
                  },
                  "imageRegistryCredential": {
                    "server": "[parameters('registryServer')]",
                    "username": "[parameters('registryUserName')]",
                    "password": "[parameters('registryPassword')]"
                  }
                }
              ],
              "replicaCount": "[parameters('frontEndReplicaCount')]",
              "networkRefs": [
                {
                  "name": "[resourceId('Microsoft.ServiceFabricMesh/networks', 'MeshAppNetwork')]"
                }
              ]
            }
          },
          {
            "name": "ServiceB",
            ...
          }
        ],
        "description": "Application description."
      }
    },
    {
      "apiVersion": "2018-07-01-preview",
      "name": "MeshAppNetwork",
      "type": "Microsoft.ServiceFabricMesh/networks",
      "location": "[parameters('location')]",
      "dependsOn": [],
      "properties": {
        "description": "MeshAppNetwork description.",
        "addressPrefix": "10.0.0.4/22",
        "ingressConfig": {
          "layer4": [
            {
              "name": "ServiceAIngress",
              "publicPort": "20001",
              "applicationName": "MyMeshApplication",
              "serviceName": "ServiceA",
              "endpointName": "ServiceAListener"
            }
          ]
        }
      }
    },
    {
      "apiVersion": "2018-09-01-preview",
      "name": "ServiceAVolume",
      "type": "Microsoft.ServiceFabricMesh/volumes",
      "location": "[parameters('location')]",
      "dependsOn": [],
      "properties": {
        "description": "Azure Files storage volume for counter App.",
        "provider": "SFAzureFile",
        "azureFileParameters": {
          "shareName": "[parameters('fileShareName')]",
          "accountName": "[parameters('storageAccountName')]",
          "accountKey": "[parameters('storageAccountKey')]"
        }
      }
    }
  ]
}

Refer to the mesh_rp.windows.json deployment template file for the specifics of the To Do List application.

Deploy the application to Service Fabric Mesh

Create the application and related resources using the following command, and provide the credentials from the previous Retrieve credentials for the registry step.

In the parameters file, update the following parameter values:

Parameter Value
location The region to deploy the application to. For example, "eastus".
registryPassword The password you obtained previously in Retrieve credentials for the registry. This parameter in the template is a secure string and will not be displayed in the deployment status or az mesh service show commands.
registryUserName The username you obtained in Retrieve credentials for the registry.
registryServer The registry server name you obtained in Retrieve credentials for the registry.
frontEndImage The container image for the front end service. For example, <myregistry>.azurecr.io/seabreeze/azure-mesh-todo-webfrontend:1.0-nanoserver-1709.
serviceImage The container image for the back end service. For example, <myregistry>.azurecr.io/seabreeze/azure-mesh-todo-service:1.0-nanoserver-1709.

To deploy the application, run the following:

az mesh deployment create --resource-group myResourceGroup --template-file c:\temp\mesh_rp.windows.json --parameters c:\temp\mesh_rp.windows.parameters.json

This command will produce a JSON snippet that is shown below. Under the outputs section of the JSON output, copy the publicIPAddress property.

"outputs": {
    "publicIPAddress": {
    "type": "String",
    "value": "40.83.78.216"
    }
}

This information comes from the outputs section in the ARM template. As shown below, this section references the Gateway resource to fetch the public IP address.

  "outputs": {
    "publicIPAddress": {
      "value": "[reference('todolistappGateway').ipAddress]",
      "type": "string"
    }
  }

Open the application

Once the application successfully deploys, get the public IP address for the service endpoint. The deployment command returns the public IP address of the service endpoint. Optionally, you can also query the network resource to find the public IP address of the service endpoint. The network resource name for this application is todolistappNetwork, fetch information about it using the following command.

az mesh gateway show --resource-group myResourceGroup --name todolistappGateway

Navigate to the IP address in a web browser.

Check application status

You can check the application's status using the app show command. The application name for the deployed application is "todolistapp", so fetch its details.

az mesh app show --resource-group myResourceGroup --name todolistapp

Examine the logs for the deployed application using the az mesh code-package-log get command:

az mesh code-package-log get --resource-group myResourceGroup --application-name todolistapp --service-name WebFrontEnd --replica-name 0 --code-package-name WebFrontEnd

Next steps

In this part of the tutorial, you learned how to:

  • Create a private container registry
  • Push a container image to the registry
  • Create a template and parameters file
  • Deploy an application to Service Fabric Mesh

Advance to the next tutorial: