Akka.Discovery.AwsApi 1.0.0-beta1

Prefix Reserved
This is a prerelease version of Akka.Discovery.AwsApi.
There is a newer version of this package available.
See the version list below for details.
dotnet add package Akka.Discovery.AwsApi --version 1.0.0-beta1                
NuGet\Install-Package Akka.Discovery.AwsApi -Version 1.0.0-beta1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Akka.Discovery.AwsApi" Version="1.0.0-beta1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Akka.Discovery.AwsApi --version 1.0.0-beta1                
#r "nuget: Akka.Discovery.AwsApi, 1.0.0-beta1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Akka.Discovery.AwsApi as a Cake Addin
#addin nuget:?package=Akka.Discovery.AwsApi&version=1.0.0-beta1&prerelease

// Install Akka.Discovery.AwsApi as a Cake Tool
#tool nuget:?package=Akka.Discovery.AwsApi&version=1.0.0-beta1&prerelease                

AWS API Based Discovery

If you’re using EC2 directly or you’re using ECS with host mode networking and you’re deploying one container per cluster member, continue to AWS EC2 Tag-Based Discovery

If you’re using ECS with awsvpcs mode networking (whether on EC2 or with Fargate), continue to AWS ECS Discovery.

ECS with bridge mode networking is not supported.

AWS EC2 Tag-Based Discovery

This module can be used as a discovery method for an AWS EC2 based cluster.

You can use tags to simply mark the instances that belong to the same cluster. Use a tag that has “service” as the key and set the value equal to the name of your service.

Note that this implementation is adequate for users running service clusters on vanilla EC2 instances. These instances can be created and tagged manually, or created via an auto-scaling group (ASG). If they are created via an ASG, they can be tagged automatically on creation. Simply add the tag to the auto-scaling group configuration and ensure the “Tag New Instances” option is checked.

Configuring using Akka.Hosting

You can add Akka.Discovery.AwsApi.Ec2 support by using the WithAwsEc2Discovery extension method.

builder.WithAwsEc2Discovery();

or

builder.WithAwsEc2Discovery(setup => {
    setup.WithCredentialProvider<AnonymousEc2CredentialProvider>();
    setup.TagKey = "myTag";
});

or

builder.WithAwsEc2Discovery(new Ec2ServiceDiscoverySetup {
    TagKey = "myTag"
});

Configuring using HOCON configuration

To use Akka.Discovery.AwsApi in your project will need to include these HOCON settings in your HOCON configuration:

akka.discovery {
  # Set the following in your application.conf if you want to use this discovery mechanism:
  # method = aws-api-ec2-tag-based
  aws-api-ec2-tag-based {
    class = "Akka.Discovery.AwsApi.Ec2.Ec2TagBasedServiceDiscovery, Akka.Discovery.AwsApi"

    # Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either 
    # a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
    client-config = ""
    
    credentials-provider = instance-metadata-credential-provider

    tag-key = "service"

    # filters have to be in key=value format, separated by semi-colon
    filters = ""

    # If you want multiple akka nodes (i.e. JVMs) per EC2 instance, set the following
    # to the list of Akka Management port numbers
    ports = []

    # client may use specified endpoint for example ec2.us-west-1.amazonaws.com
    # region is automatically extrapolated from the endpoint URL
    # endpoint = ""
    
    # client may use specified region for example us-west-1
    # endpoints are automatically generated.
    # NOTE: You can only set either an endpoint OR a region, not both.
    #       Region will always win if both are declared.
    # region = ""
    
    anonymous-credential-provider {
        # Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either 
        # a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
        class = "Akka.Discovery.AwsApi.Ec2.AnonymousEc2CredentialProvider, Akka.Discovery.AwsApi"    
    }
    
    # This configuration provider leverages the EC2 instance metadata service to provide connection
    # information for the AWS EC2 client.
    # Please read https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html
    # on AWS EC2 metadata profile setup.
    instance-metadata-credential-provider {
        # Fully qualified class name of a class that extends Akka.Discovery.AwsApi.Ec2.Ec2ConfigurationProvider with either 
        # a no arguments constructor or a single argument constructor that takes an ExtendedActorSystem
        class = "Akka.Discovery.AwsApi.Ec2.Ec2InstanceMetadataCredentialProvider, Akka.Discovery.AwsApi"
        
        # Name of the Amazon IAM Role to be used as credential provider
        # If null or entry, the first returned credential is used.
        role = ""
    }    
  }
}

Using Discovery Together with Akka.Management and Cluster.Bootstrap

All discovery plugins are designed to work with Cluster.Bootstrap to provide an automated way to form a cluster that is not based on hard wired seeds configuration.

Configuring with Akka.Hosting

Auto-starting Akka.Management, Akka.Management.Cluster.Bootstrap, and Akka.Discovery.AwsApi.Ec2

using var host = new HostBuilder()
    .ConfigureServices((context, services) =>
    {
        services.AddAkka("ec2BootstrapDemo", (builder, provider) =>
        {
            builder
                .WithRemoting("", 4053)
                .WithClustering()
                .WithClusterBootstrap(serviceName: "testService")
                .WithAwsEc2Discovery();
        });
    }).Build();

await host.RunAsync();

Manually starting Akka.Management, Akka.Management.Cluster.Bootstrap and Akka.Discovery.AwsApi.Ec2

using var host = new HostBuilder()
    .ConfigureServices((context, services) =>
    {
        services.AddAkka("ec2BootstrapDemo", (builder, provider) =>
        {
            builder
                .WithRemoting("", 4053)
                .WithClustering()
                .WithAkkaManagement()
                .WithClusterBootstrap(
                    serviceName: "testService",
                    autoStart: false)
                .WithAwsEc2Discovery();
            
            builder.AddStartup(async (system, registry) =>
            {
                await AkkaManagement.Get(system).Start();
                await ClusterBootstrap.Get(system).Start();
            });
        });
    }).Build();

await host.RunAsync();

NOTE

In order for for EC2 Discovery to work, you also need open Akka.Management port on your EC2 instances (8558 by default)

Configuring with HOCON Configuration

Some HOCON configuration is needed to make discovery work with Cluster.Bootstrap:

akka.discovery.method = aws-api-ec2-tag-based
akka.management.http.routes = {
    cluster-bootstrap = "Akka.Management.Cluster.Bootstrap.ClusterBootstrapProvider, Akka.Management.Cluster.Bootstrap"
}

You then start the cluster bootstrapping process by calling:

await AkkaManagement.Get(system).Start();
await ClusterBootstrap.Get(system).Start();

A more complete example:

var config = ConfigurationFactory
    .ParseString(File.ReadAllText("application.conf"))
    .WithFallback(ClusterBootstrap.DefaultConfiguration())
    .WithFallback(AkkaManagementProvider.DefaultConfiguration());

var system = ActorSystem.Create("my-system", config);
var log = Logging.GetLogger(system, this);

await AkkaManagement.Get(system).Start();
await ClusterBootstrap.Get(system).Start();

var cluster = Cluster.Get(system);
cluster.RegisterOnMemberUp(() => {
  var upMembers = cluster.State.Members
      .Where(m => m.Status == MemberStatus.Up)
      .Select(m => m.Address.ToString());

  log.Info($"Current up members: [{string.Join(", ", upMembers)}]")
});

NOTE

In order for for EC2 Discovery to work, you also need open Akka.Management port on your EC2 instances (8558 by default)

Configuration

EC2 Client Configuration

You can extend the Amazon.EC2.AmazonEC2Config class to provide your own configuration implementation for the internal EC2 client; the extended class can have either an empty constructor or a constructor that takes an ExtendedActorSystem as a parameter.

To have the discovery module to use your configuration implementation you can either pass the type into Ec2ServiceDiscoverySetup if you are using Akka.Hosting or provide the fully qualified class name of your implementation in the akka.discovery.aws-api-ec2-tag-based.client-config property inside the HOCON configuration.

  • Akka.Hosting:

    builder.WithAwsEc2Discovery(setup => {
      setup.ClientConfig = typeof(MyAmazonEc2Config);
    });
    
  • HOCON:

    akka.discovery {
      aws-api-ec2-tag-based {
        client-config = "MyAkkaAssembly.MyAmazonEc2Config, MyAkkaAssembly"
      }
    }
    

EC2 Client Credentials Configuration

Client credentials are provided by the Akka.Discovery.AwsApi.Ec2.Ec2CredentialProvider abstract class. There are two implementation provided out of the box, AnonymousEc2CredentialProvider and Ec2InstanceMetadataCredentialProvider.

Anonymous Ec2 Credential Provider

AnonymousEc2CredentialProvider is a very simple credential provider and will return an AnonymousAWSCredentials.

Ec2 Instance Metadata Service Credential Provider

Ec2InstanceMetadataCredentialProvider will try its best to retrieve the correct session credential provider using the AWS EC2 Instance Metadata Service (IMDS) API. It will return an AnonymousAWSCredential if it fails to obtain a credential from the metadata API service.

WARNING

This method will only work if:

  • The discovery service is running inside an EC2 instance
  • The EC2 instance metadata service is NOT disabled (AWS_EC2_METADATA_DISABLED environment variable is NOT set)
  • The IAM role of the instance is properly set, and
  • The metadata options of the instance is set to use the IMDSv2 metadata service.
Custom Credential Provider

To create a custom credential provider, you can extend the Akka.Discovery.AwsApi.Ec2.Ec2CredentialProvider abstract class. You then reference the fully qualified class name of your custom provider.

  • Akka.Hosting:

    builder.WithAwsEc2Discovery(setup => {
      setup.CredentialsProvider = typeof(CustomCredentialProvider);
    });
    
  • HOCON:

    akka.discovery {
      aws-api-ec2-tag-based {
        credentials-provider = "MyAkkaAssembly.CustomCredentialProvider, MyAkkaAssembly"
      }
    }
    

Notes

  • You will need to make sure that the proper privileges are in place for the discovery implementation to access the Amazon EC2 API. The simplest way to do this is by creating a IAM role that, at a minimum, allows the DescribeInstances action. Attach this IAM role to the EC2 instances that need to access the discovery implementation. See the docs for IAM Roles for Amazon EC2.
  • In general, for the EC2 instances to “talk to each other” (necessary for forming a cluster), they need to be in the same security group and the proper rules have to be set.
  • You can set additional filters (by instance type, region, other tags etc.).
    • Akka.Hosting

      builder.WithAwsEc2Discovery(setup => {
        setup.Filters = new List<Filter> {
          new ("instance-type", new List<string>{ "m1.small" }),
          new ("tag:purpose", new List<string>{ "production" }),
        };
      })  
      
    • HOCON

      akka.discovery.aws-api-ec2-tag-based.filters. The filters have to be key=value pairs separated by the semicolon character. For example:

      akka.discovery.aws-api-ec2-tag-based {
        filters = "instance-type=m1.small;tag:purpose=production"
      }
      
  • By default, this module is configured for clusters with one Akka node per EC2 instance: it separates cluster members solely by their EC2 IP address. However, we can change the default configuration to indicate multiple ports per discovered EC2 IP, and achieve a setup with multiple Akka nodes per EC2 instance.
    • Akka.Hosting
      builder.WithAwsEc2Discovery(setup => {
        setup.Ports = new List<int> { 8557, 8558, 8559 };
      });
      
    • HOCON
      akka.discovery.aws-api-ec2-tag-based {
        ports = [8557, 8558, 8559] # 3 Akka nodes per EC2 instance
      }
      
    Note: this comes with the limitation that each EC2 instance has to have the same number of Akka nodes.
  • You can change the default tag key from “service” to something else.
    • Akka.Hosting

      builder.WithAwsEc2Discovery(setup => {
        setup.TagKey = "akka-cluster";
      }); 
      
    • HOCON

      akka.discovery.aws-api-ec2-tag-based {
        tag-key = "akka-cluster"
      }
      

I'm getting an AmazonEC2Exception: The request must contain the parameter AWSAccessKeyId

Please consider using the Ec2InstanceMetadataCredentialProvider credential provider if your discovery service lives inside an EC2 instance. Make sure that your instance is assigned to a proper role and the Instance Metadata Service (IMDS) version is set to IMDSv2.

You can check to see if the metadata service is running by running curl inside your instance:

curl http://169.254.169.254

It should return a 200-OK if the metadata service is running.

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html

AWS ECS Discovery

If you’re using ECS with awsvpcs mode networking, you can have all task instances of a given ECS service discover each other.

  • Akka.Hosting

    builder.WithAwsEcsDiscovery(clusterName: "your-ecs-cluster-name");
    
  • HOCON

    akka.discovery {
      method = aws-api-ecs
      aws-api-ecs {
        # Defaults to "default" to match the AWS default cluster name if not overridden
        cluster = "your-ecs-cluster-name"
      }
    }
    

Using Discovery Together with Akka.Management and Cluster.Bootstrap

For Cluster.Bootstrap, you will need to set ClusterBootstrapSetup.ContactPointDiscovery.ServiceName or akka.management.cluster.bootstrap.contact-point-discovery.service-name HOCON setting to the ECS service name.

  • Akka.Hosting

    builder.WithClusterBootstrap(setup =>
      {
          setup.ContactPointDiscovery.ServiceName = "your-ecs-service-name";
      }, autoStart: true);
    
  • HOCON

    akka.management.cluster.bootstrap.contact-point-discovery {
      service-name = "your-ecs-service-name"
    }
    

Notes

  • Since the implementation uses the AWS ECS API, you’ll need to make sure that AWS credentials are provided. The simplest way to do this is to create an IAM role that includes appropriate permissions for AWS ECS API access. Attach this IAM role to the task definition of the ECS Service. See the docs for IAM Roles for Tasks.

  • In general, for the ECS task instances to “talk to each other” (necessary for forming a cluster), they need to be in the same security group and the proper rules have to be set. See the docs for Task Networking with the awsvpc Network Mode.

  • Because of how awsvpc mode is set up, Akka.Remote and Akka.Management may not be able to automatically determine the host address via DNS resolution. To address this, you will need to set these settings manually using the provided AwsEcsDiscovery.GetContainerAddress() static utility method. Please check the code example on how to do this.

  • Because ECS service discovery can only discover IP addresses (not ports) you’ll need to set akka.management.cluster.bootstrap.contact-point.fallback-port = 8558, where 8558 is whatever port you choose to bind Akka.Management to.

  • You can set additional filters to only discover nodes with specific tag values in your application.conf file, in the akka.discovery.aws-api-ecs-async.tags key. An empty list of tags will not filter any nodes out.

    For example:

    akka.discovery.aws-api-ecs-async { 
      tags = [ 
        { key = "environment", value = "staging" }, 
        { key = "deployment-side", value = "blue" } 
      ] 
    }
    
  • The current implementation only supports discovery of service task instances within the same region.

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 is compatible.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp2.0 was computed.  netcoreapp2.1 was computed.  netcoreapp2.2 was computed.  netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.0 is compatible.  netstandard2.1 was computed. 
.NET Framework net461 was computed.  net462 was computed.  net463 was computed.  net47 was computed.  net471 was computed.  net472 was computed.  net48 was computed.  net481 was computed. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen40 was computed.  tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
1.5.31 315 11/11/2024
1.5.30 1,419 10/3/2024
1.5.29 159 10/1/2024
1.5.27 2,805 7/30/2024
1.5.26.1 148 7/16/2024
1.5.26 87 7/15/2024
1.5.26-beta3 101 7/2/2024
1.5.26-beta2 100 6/28/2024
1.5.26-beta1 77 6/27/2024
1.5.25.1 2,082 6/25/2024
1.5.25 322 6/17/2024
1.5.24 109 6/11/2024
1.5.19 253 4/17/2024
1.5.18-beta2 94 3/27/2024
1.5.18-beta1 105 3/20/2024
1.5.17.1 271 3/4/2024
1.5.15 178 1/12/2024
1.5.7 413 5/23/2023
1.5.5 189 5/8/2023
1.5.0 467 3/2/2023
1.5.0-beta6 160 3/1/2023
1.5.0-alpha4 139 2/17/2023
1.0.3 241 2/13/2023
1.0.2 247 2/8/2023
1.0.1 285 1/31/2023
1.0.0 309 1/18/2023
1.0.0-beta2 143 1/7/2023
1.0.0-beta1 155 1/6/2023
0.3.0-beta4 251 12/2/2022
0.3.0-beta3 183 11/7/2022
0.3.0-beta2 220 10/20/2022
0.3.0-beta1 155 10/6/2022
0.2.5-beta4 186 8/31/2022
0.2.5-beta3 8,242 8/16/2022
0.2.5-beta2 216 8/8/2022
0.2.5-beta1 206 8/1/2022
0.2.4-beta3 252 5/5/2022
0.2.4-beta2 229 4/14/2022
0.2.4-beta1 403 12/2/2021
0.2.3-beta2 691 10/5/2021
0.2.3-beta1 254 10/4/2021
0.2.2-beta1 269 9/29/2021
0.2.1-beta4 217 9/3/2021
0.2.1-beta3 258 8/16/2021
0.2.1-beta2 254 8/12/2021
0.2.1-beta1 239 8/6/2021
0.2.0-beta1 293 8/5/2021
0.1.0-beta2 265 8/3/2021
0.1.0-beta1 228 7/16/2021

Update to [Akka.NET v1.4.48](https://github.com/akkadotnet/akka.net/releases/tag/1.4.48)
[Replace original JVM web routing port with Ceen routing](https://github.com/akkadotnet/Akka.Management/pull/1152)
[Delete health check endpoint and merge cluster bootstrap endpoint to akka.management](https://github.com/akkadotnet/Akka.Management/pull/1053)
[[Coordination.Kubernetes] Hosting extension now accepts options class and not setup](https://github.com/akkadotnet/Akka.Management/pull/1172)
[[Coordination.Azure] Hosting extension now accepts options class and not setup](https://github.com/akkadotnet/Akka.Management/pull/1181)
Update dependency NuGet package versions
[Bump Petabridge.Cmd from 1.2.0 to 1.2.1](https://github.com/akkadotnet/Akka.Management/pull/1071)
[Bump Akka.Hosting from 0.5.2-beta1 to 1.0.0](https://github.com/akkadotnet/Akka.Management/pull/1154)
[Bump AWSSDK.S3 from 3.7.101.30 to 3.7.101.33](https://github.com/akkadotnet/Akka.Management/pull/1076)
[Bump AWSSDK.ECS from 3.7.102.8 to 3.7.102.11](https://github.com/akkadotnet/Akka.Management/pull/1077)
[Bump AWSSDK.CloudFormation from 3.7.102.9 to 3.7.102.11](https://github.com/akkadotnet/Akka.Management/pull/1074)
[Bump AWSSDK.EC2 from 3.7.111.1 to 3.7.113](https://github.com/akkadotnet/Akka.Management/pull/1067)
[Bump Google.Protobuf from 3.21.11 to 3.21.12](https://github.com/akkadotnet/Akka.Management/pull/1073)
API breaking change**
To make the API consistent with other `Akka.Hosting` plugin ecosystem, `Akka.Coordination.Kubernetes` `WithKubernetesLease()` now takes `KubernetesLeaseOption` as its argument, not `KubernetesLeaseSetup`.
To make the API consistent with other `Akka.Hosting` plugin ecosystem, `Akka.Coordination.Azure` `WithAzureLease()` now takes `AzureLeaseOption` as its argument, not `AzureLeaseSetup`.
Health check functions are consolidated into `Akka.HealthCheck`, the default health check endpoint are removed from `Akka.Management`
`Akka.Management.Cluster.Bootstrap` endpoint is merged into `Akka.Management` and became the default endpoint.