Hi
Thank you for reaching out and providing detailed information about the steps you performed during the certificate renewal process. Based on the details and the behavior observed, it appears that ClusterC is facing a certificate binding or connectivity issue following the certificate update.
It mostly likely due to the new certificate may not be fully propagated or correctly bound to the cluster configuration on all nodes. This can prevent client authentication and dashboard access.
Could you please check the below details:
- Ensure the certificate thumbprint in the Cluster configuration matches the new certificate.
- Ensure ports 19000 and 19080 are open in the Network Security Group (NSG) and Load Balancer. From your management VM, run:
Test-NetConnection <ClusterC-IP> -Port 19000
Test-NetConnection <ClusterC-IP> -Port 19080
If these tests fail, it’s likely a network or firewall configuration issue.
3.Since Clusters A and B are working fine, please compare Cluster C’s certificate thumbprint, VMSS settings, and NSG rules with those clusters to make sure nothing is missing.
- Run the following PowerShell command to verify the health state:
Get-ServiceFabricClusterHealth
If any node or subsystem shows as unhealthy, review the event logs or the Service Fabric trace files for certificate or connectivity-related errors.
https://docs.azure.cn/en-us/service-fabric/cluster-security-certificate-management
Please let me know if you have any queries.