Akka.Discovery.AwsApi
1.0.0-beta1
Prefix Reserved
See the version list below for details.
dotnet add package Akka.Discovery.AwsApi --version 1.0.0-beta1
NuGet\Install-Package Akka.Discovery.AwsApi -Version 1.0.0-beta1
<PackageReference Include="Akka.Discovery.AwsApi" Version="1.0.0-beta1" />
paket add Akka.Discovery.AwsApi --version 1.0.0-beta1
#r "nuget: Akka.Discovery.AwsApi, 1.0.0-beta1"
// Install Akka.Discovery.AwsApi as a Cake Addin #addin nuget:?package=Akka.Discovery.AwsApi&version=1.0.0-beta1&prerelease // Install Akka.Discovery.AwsApi as a Cake Tool #tool nuget:?package=Akka.Discovery.AwsApi&version=1.0.0-beta1&prerelease
AWS API Based Discovery
If you’re using EC2 directly or you’re using ECS with host mode networking and you’re deploying one container per cluster member, continue to AWS EC2 Tag-Based Discovery
If you’re using ECS with awsvpcs mode networking (whether on EC2 or with Fargate), continue to AWS ECS Discovery.
ECS with bridge mode networking is not supported.
AWS EC2 Tag-Based Discovery
This module can be used as a discovery method for an AWS EC2 based cluster.
You can use tags to simply mark the instances that belong to the same cluster. Use a tag that has “service” as the key and set the value equal to the name of your service.
Note that this implementation is adequate for users running service clusters on vanilla EC2 instances. These instances can be created and tagged manually, or created via an auto-scaling group (ASG). If they are created via an ASG, they can be tagged automatically on creation. Simply add the tag to the auto-scaling group configuration and ensure the “Tag New Instances” option is checked.
Configuring using Akka.Hosting
You can add Akka.Discovery.AwsApi.Ec2
support by using the WithAwsEc2Discovery
extension method.
builder.WithAwsEc2Discovery();
or
builder.WithAwsEc2Discovery(setup => {
setup.WithCredentialProvider<AnonymousEc2CredentialProvider>();
setup.TagKey = "myTag";
});
or
builder.WithAwsEc2Discovery(new Ec2ServiceDiscoverySetup {
TagKey = "myTag"
});
Configuring using HOCON configuration
To use Akka.Discovery.AwsApi
in your project will need to include these HOCON settings in your HOCON configuration:
akka.discovery {
# Set the following in your application.conf if you want to use this discovery mechanism:
# method = aws-api-ec2-tag-based
aws-api-ec2-tag-based {
class = "Akka.Discovery.AwsApi.Ec2.Ec2TagBasedServiceDiscovery, Akka.Discovery.AwsApi"
# Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either
# a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
client-config = ""
credentials-provider = instance-metadata-credential-provider
tag-key = "service"
# filters have to be in key=value format, separated by semi-colon
filters = ""
# If you want multiple akka nodes (i.e. JVMs) per EC2 instance, set the following
# to the list of Akka Management port numbers
ports = []
# client may use specified endpoint for example ec2.us-west-1.amazonaws.com
# region is automatically extrapolated from the endpoint URL
# endpoint = ""
# client may use specified region for example us-west-1
# endpoints are automatically generated.
# NOTE: You can only set either an endpoint OR a region, not both.
# Region will always win if both are declared.
# region = ""
anonymous-credential-provider {
# Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either
# a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
class = "Akka.Discovery.AwsApi.Ec2.AnonymousEc2CredentialProvider, Akka.Discovery.AwsApi"
}
# This configuration provider leverages the EC2 instance metadata service to provide connection
# information for the AWS EC2 client.
# Please read https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html
# on AWS EC2 metadata profile setup.
instance-metadata-credential-provider {
# Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either
# a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
class = "Akka.Discovery.AwsApi.Ec2.Ec2InstanceMetadataCredentialProvider, Akka.Discovery.AwsApi"
# Name of the Amazon IAM Role to be used as credential provider
# If null or entry, the first returned credential is used.
role = ""
}
}
}
Using Discovery Together with Akka.Management and Cluster.Bootstrap
All discovery plugins are designed to work with Cluster.Bootstrap to provide an automated way to form a cluster that is not based on hard wired seeds configuration.
Configuring with Akka.Hosting
Auto-starting Akka.Management, Akka.Management.Cluster.Bootstrap, and Akka.Discovery.AwsApi.Ec2
using var host = new HostBuilder()
.ConfigureServices((context, services) =>
{
services.AddAkka("ec2BootstrapDemo", (builder, provider) =>
{
builder
.WithRemoting("", 4053)
.WithClustering()
.WithClusterBootstrap(serviceName: "testService")
.WithAwsEc2Discovery();
});
}).Build();
await host.RunAsync();
Manually starting Akka.Management, Akka.Management.Cluster.Bootstrap and Akka.Discovery.AwsApi.Ec2
using var host = new HostBuilder()
.ConfigureServices((context, services) =>
{
services.AddAkka("ec2BootstrapDemo", (builder, provider) =>
{
builder
.WithRemoting("", 4053)
.WithClustering()
.WithAkkaManagement()
.WithClusterBootstrap(
serviceName: "testService",
autoStart: false)
.WithAwsEc2Discovery();
builder.AddStartup(async (system, registry) =>
{
await AkkaManagement.Get(system).Start();
await ClusterBootstrap.Get(system).Start();
});
});
}).Build();
await host.RunAsync();
NOTE
In order for for EC2 Discovery to work, you also need open Akka.Management port on your EC2 instances (8558 by default)
Configuring with HOCON Configuration
Some HOCON configuration is needed to make discovery work with Cluster.Bootstrap:
akka.discovery.method = aws-api-ec2-tag-based
akka.management.http.routes = {
cluster-bootstrap = "Akka.Management.Cluster.Bootstrap.ClusterBootstrapProvider, Akka.Management.Cluster.Bootstrap"
}
You then start the cluster bootstrapping process by calling:
await AkkaManagement.Get(system).Start();
await ClusterBootstrap.Get(system).Start();
A more complete example:
var config = ConfigurationFactory
.ParseString(File.ReadAllText("application.conf"))
.WithFallback(ClusterBootstrap.DefaultConfiguration())
.WithFallback(AkkaManagementProvider.DefaultConfiguration());
var system = ActorSystem.Create("my-system", config);
var log = Logging.GetLogger(system, this);
await AkkaManagement.Get(system).Start();
await ClusterBootstrap.Get(system).Start();
var cluster = Cluster.Get(system);
cluster.RegisterOnMemberUp(() => {
var upMembers = cluster.State.Members
.Where(m => m.Status == MemberStatus.Up)
.Select(m => m.Address.ToString());
log.Info($"Current up members: [{string.Join(", ", upMembers)}]")
});
NOTE
In order for for EC2 Discovery to work, you also need open Akka.Management port on your EC2 instances (8558 by default)
Configuration
EC2 Client Configuration
You can extend the Amazon.EC2.AmazonEC2Config
class to provide your own configuration implementation for the internal EC2 client; the extended class can have either an empty constructor or a constructor that takes an ExtendedActorSystem as a parameter.
To have the discovery module to use your configuration implementation you can either pass the type into Ec2ServiceDiscoverySetup
if you are using Akka.Hosting or provide the fully qualified class name of your implementation in the akka.discovery.aws-api-ec2-tag-based.client-config property inside the HOCON configuration.
Akka.Hosting:
builder.WithAwsEc2Discovery(setup => { setup.ClientConfig = typeof(MyAmazonEc2Config); });
HOCON:
akka.discovery { aws-api-ec2-tag-based { client-config = "MyAkkaAssembly.MyAmazonEc2Config, MyAkkaAssembly" } }
EC2 Client Credentials Configuration
Client credentials are provided by the Akka.Discovery.AwsApi.Ec2.Ec2CredentialProvider
abstract class. There are two implementation provided out of the box, AnonymousEc2CredentialProvider
and Ec2InstanceMetadataCredentialProvider
.
Anonymous Ec2 Credential Provider
AnonymousEc2CredentialProvider
is a very simple credential provider and will return an AnonymousAWSCredentials
.
Ec2 Instance Metadata Service Credential Provider
Ec2InstanceMetadataCredentialProvider
will try its best to retrieve the correct session credential provider using the AWS EC2 Instance Metadata Service (IMDS) API. It will return an AnonymousAWSCredential
if it fails to obtain a credential from the metadata API service.
WARNING
This method will only work if:
- The discovery service is running inside an EC2 instance
- The EC2 instance metadata service is NOT disabled (AWS_EC2_METADATA_DISABLED environment variable is NOT set)
- The IAM role of the instance is properly set, and
- The metadata options of the instance is set to use the IMDSv2 metadata service.
Custom Credential Provider
To create a custom credential provider, you can extend the Akka.Discovery.AwsApi.Ec2.Ec2CredentialProvider
abstract class. You then reference the fully qualified class name of your custom provider.
Akka.Hosting:
builder.WithAwsEc2Discovery(setup => { setup.CredentialsProvider = typeof(CustomCredentialProvider); });
HOCON:
akka.discovery { aws-api-ec2-tag-based { credentials-provider = "MyAkkaAssembly.CustomCredentialProvider, MyAkkaAssembly" } }
Notes
- You will need to make sure that the proper privileges are in place for the discovery implementation to access the Amazon EC2 API. The simplest way to do this is by creating a IAM role that, at a minimum, allows the DescribeInstances action. Attach this IAM role to the EC2 instances that need to access the discovery implementation. See the docs for IAM Roles for Amazon EC2.
- In general, for the EC2 instances to “talk to each other” (necessary for forming a cluster), they need to be in the same security group and the proper rules have to be set.
- You can set additional filters (by instance type, region, other tags etc.).
Akka.Hosting
builder.WithAwsEc2Discovery(setup => { setup.Filters = new List<Filter> { new ("instance-type", new List<string>{ "m1.small" }), new ("tag:purpose", new List<string>{ "production" }), }; })
HOCON
akka.discovery.aws-api-ec2-tag-based.filters. The filters have to be key=value pairs separated by the semicolon character. For example:
akka.discovery.aws-api-ec2-tag-based { filters = "instance-type=m1.small;tag:purpose=production" }
- By default, this module is configured for clusters with one Akka node per EC2 instance: it separates cluster members solely by their EC2 IP address. However, we can change the default configuration to indicate multiple ports per discovered EC2 IP, and achieve a setup with multiple Akka nodes per EC2 instance.
- Akka.Hosting
builder.WithAwsEc2Discovery(setup => { setup.Ports = new List<int> { 8557, 8558, 8559 }; });
- HOCON
akka.discovery.aws-api-ec2-tag-based { ports = [8557, 8558, 8559] # 3 Akka nodes per EC2 instance }
- Akka.Hosting
- You can change the default tag key from “service” to something else.
Akka.Hosting
builder.WithAwsEc2Discovery(setup => { setup.TagKey = "akka-cluster"; });
HOCON
akka.discovery.aws-api-ec2-tag-based { tag-key = "akka-cluster" }
I'm getting an AmazonEC2Exception: The request must contain the parameter AWSAccessKeyId
Please consider using the Ec2InstanceMetadataCredentialProvider
credential provider if your discovery service lives inside an EC2 instance. Make sure that your instance is assigned to a proper role and the Instance Metadata Service (IMDS) version is set to IMDSv2.
You can check to see if the metadata service is running by running curl inside your instance:
curl http://169.254.169.254
It should return a 200-OK if the metadata service is running.
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html
AWS ECS Discovery
If you’re using ECS with awsvpcs mode networking, you can have all task instances of a given ECS service discover each other.
Akka.Hosting
builder.WithAwsEcsDiscovery(clusterName: "your-ecs-cluster-name");
HOCON
akka.discovery { method = aws-api-ecs aws-api-ecs { # Defaults to "default" to match the AWS default cluster name if not overridden cluster = "your-ecs-cluster-name" } }
Using Discovery Together with Akka.Management and Cluster.Bootstrap
For Cluster.Bootstrap, you will need to set ClusterBootstrapSetup.ContactPointDiscovery.ServiceName
or akka.management.cluster.bootstrap.contact-point-discovery.service-name HOCON setting to the ECS service name.
Akka.Hosting
builder.WithClusterBootstrap(setup => { setup.ContactPointDiscovery.ServiceName = "your-ecs-service-name"; }, autoStart: true);
HOCON
akka.management.cluster.bootstrap.contact-point-discovery { service-name = "your-ecs-service-name" }
Notes
Since the implementation uses the AWS ECS API, you’ll need to make sure that AWS credentials are provided. The simplest way to do this is to create an IAM role that includes appropriate permissions for AWS ECS API access. Attach this IAM role to the task definition of the ECS Service. See the docs for IAM Roles for Tasks.
In general, for the ECS task instances to “talk to each other” (necessary for forming a cluster), they need to be in the same security group and the proper rules have to be set. See the docs for Task Networking with the awsvpc Network Mode.
Because of how awsvpc mode is set up, Akka.Remote and Akka.Management may not be able to automatically determine the host address via DNS resolution. To address this, you will need to set these settings manually using the provided
AwsEcsDiscovery.GetContainerAddress()
static utility method. Please check the code example on how to do this.Because ECS service discovery can only discover IP addresses (not ports) you’ll need to set akka.management.cluster.bootstrap.contact-point.fallback-port = 8558, where 8558 is whatever port you choose to bind Akka.Management to.
You can set additional filters to only discover nodes with specific tag values in your application.conf file, in the akka.discovery.aws-api-ecs-async.tags key. An empty list of tags will not filter any nodes out.
For example:
akka.discovery.aws-api-ecs-async { tags = [ { key = "environment", value = "staging" }, { key = "deployment-side", value = "blue" } ] }
The current implementation only supports discovery of service task instances within the same region.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 was computed. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.0
- Akka.Discovery (>= 1.4.48)
- Akka.Hosting (>= 1.0.0)
- AWSSDK.EC2 (>= 3.7.113)
- AWSSDK.ECS (>= 3.7.102.11)
-
net6.0
- Akka.Discovery (>= 1.4.48)
- Akka.Hosting (>= 1.0.0)
- AWSSDK.EC2 (>= 3.7.113)
- AWSSDK.ECS (>= 3.7.102.11)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
1.5.31 | 315 | 11/11/2024 |
1.5.30 | 1,419 | 10/3/2024 |
1.5.29 | 159 | 10/1/2024 |
1.5.27 | 2,805 | 7/30/2024 |
1.5.26.1 | 148 | 7/16/2024 |
1.5.26 | 87 | 7/15/2024 |
1.5.26-beta3 | 101 | 7/2/2024 |
1.5.26-beta2 | 100 | 6/28/2024 |
1.5.26-beta1 | 77 | 6/27/2024 |
1.5.25.1 | 2,082 | 6/25/2024 |
1.5.25 | 322 | 6/17/2024 |
1.5.24 | 109 | 6/11/2024 |
1.5.19 | 253 | 4/17/2024 |
1.5.18-beta2 | 94 | 3/27/2024 |
1.5.18-beta1 | 105 | 3/20/2024 |
1.5.17.1 | 271 | 3/4/2024 |
1.5.15 | 178 | 1/12/2024 |
1.5.7 | 413 | 5/23/2023 |
1.5.5 | 189 | 5/8/2023 |
1.5.0 | 467 | 3/2/2023 |
1.5.0-beta6 | 160 | 3/1/2023 |
1.5.0-alpha4 | 139 | 2/17/2023 |
1.0.3 | 241 | 2/13/2023 |
1.0.2 | 247 | 2/8/2023 |
1.0.1 | 285 | 1/31/2023 |
1.0.0 | 309 | 1/18/2023 |
1.0.0-beta2 | 143 | 1/7/2023 |
1.0.0-beta1 | 155 | 1/6/2023 |
0.3.0-beta4 | 251 | 12/2/2022 |
0.3.0-beta3 | 183 | 11/7/2022 |
0.3.0-beta2 | 220 | 10/20/2022 |
0.3.0-beta1 | 155 | 10/6/2022 |
0.2.5-beta4 | 186 | 8/31/2022 |
0.2.5-beta3 | 8,242 | 8/16/2022 |
0.2.5-beta2 | 216 | 8/8/2022 |
0.2.5-beta1 | 206 | 8/1/2022 |
0.2.4-beta3 | 252 | 5/5/2022 |
0.2.4-beta2 | 229 | 4/14/2022 |
0.2.4-beta1 | 403 | 12/2/2021 |
0.2.3-beta2 | 691 | 10/5/2021 |
0.2.3-beta1 | 254 | 10/4/2021 |
0.2.2-beta1 | 269 | 9/29/2021 |
0.2.1-beta4 | 217 | 9/3/2021 |
0.2.1-beta3 | 258 | 8/16/2021 |
0.2.1-beta2 | 254 | 8/12/2021 |
0.2.1-beta1 | 239 | 8/6/2021 |
0.2.0-beta1 | 293 | 8/5/2021 |
0.1.0-beta2 | 265 | 8/3/2021 |
0.1.0-beta1 | 228 | 7/16/2021 |
Update to [Akka.NET v1.4.48](https://github.com/akkadotnet/akka.net/releases/tag/1.4.48)
[Replace original JVM web routing port with Ceen routing](https://github.com/akkadotnet/Akka.Management/pull/1152)
[Delete health check endpoint and merge cluster bootstrap endpoint to akka.management](https://github.com/akkadotnet/Akka.Management/pull/1053)
[[Coordination.Kubernetes] Hosting extension now accepts options class and not setup](https://github.com/akkadotnet/Akka.Management/pull/1172)
[[Coordination.Azure] Hosting extension now accepts options class and not setup](https://github.com/akkadotnet/Akka.Management/pull/1181)
Update dependency NuGet package versions
[Bump Petabridge.Cmd from 1.2.0 to 1.2.1](https://github.com/akkadotnet/Akka.Management/pull/1071)
[Bump Akka.Hosting from 0.5.2-beta1 to 1.0.0](https://github.com/akkadotnet/Akka.Management/pull/1154)
[Bump AWSSDK.S3 from 3.7.101.30 to 3.7.101.33](https://github.com/akkadotnet/Akka.Management/pull/1076)
[Bump AWSSDK.ECS from 3.7.102.8 to 3.7.102.11](https://github.com/akkadotnet/Akka.Management/pull/1077)
[Bump AWSSDK.CloudFormation from 3.7.102.9 to 3.7.102.11](https://github.com/akkadotnet/Akka.Management/pull/1074)
[Bump AWSSDK.EC2 from 3.7.111.1 to 3.7.113](https://github.com/akkadotnet/Akka.Management/pull/1067)
[Bump Google.Protobuf from 3.21.11 to 3.21.12](https://github.com/akkadotnet/Akka.Management/pull/1073)
API breaking change**
To make the API consistent with other `Akka.Hosting` plugin ecosystem, `Akka.Coordination.Kubernetes` `WithKubernetesLease()` now takes `KubernetesLeaseOption` as its argument, not `KubernetesLeaseSetup`.
To make the API consistent with other `Akka.Hosting` plugin ecosystem, `Akka.Coordination.Azure` `WithAzureLease()` now takes `AzureLeaseOption` as its argument, not `AzureLeaseSetup`.
Health check functions are consolidated into `Akka.HealthCheck`, the default health check endpoint are removed from `Akka.Management`
`Akka.Management.Cluster.Bootstrap` endpoint is merged into `Akka.Management` and became the default endpoint.